Page 101 / 238 Scroll up to view Page 96 - 100
Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
Firewall Protection and Content Filtering
6-25
202-10085-01, March 2005
The Block Sites menu is shown in
Figure 6-15
:
Figure 6-15:
Block Sites menu
Page 102 / 238
Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
6-26
Firewall Protection and Content Filtering
202-10085-01, March 2005
Keyword application examples:
If the keyword "XXX" is specified, the URL <http://www.badstuff.com/xxx.html> is blocked,
as is the newsgroup alt.pictures.XXX.
If the keyword “.com” is specified, only websites with other domain suffixes (such as .edu or
.gov) can be viewed.
If you wish to block all Internet browsing access, enter the keyword “.”.
Table 6-4.
Block Sites
Item
Description
Web Component
Blocking
Select Proxy, Java, ActiveX and Cookies to enable respective content filtering.
Example
: By enabling Java filtering *.java files will be blocked.
Note
: Keywords are always blocked.
To block keywords or
Internet domains:
Select the Turn keyword blocking on check box.
Type a keyword or domain name in the Add Keyword box, click Add Keyword
button. The word or domain name appears in the list below. Any number of domain
names and keywords can be added to the list.
To delete a keyword or domain name: Select the word or domain name in the list,
click Delete Keyword button.
To delete all keywords: Click Delete All button to delete all the Keywords from the
list.
Groups
Select the groups specified below the Apply Keyword blocking to tab to enable
keyword blocking for those groups. The Request from the PC's that are in the group
for which Keyword filtering is enabled will undergo the Filtering process. Otherwise
the filtering does not apply. See
“Managing Groups and Hosts” on page 6-20
.
Trusted Domains
In the Trusted Domains box, enter the exact matching domain name for which the
keyword filtering will be bypassed.
Example
: Enter www.netgear.com to bypass URL keyword filtering for this
domain. The domains in this list will be allowed without any filtering, web
component filtering still applies.
Click on Add Trusted Domains button. The domain name appears in the list below.
Any number of domain names can be added to the list.
To delete a Domain name: Select the word or domain name in the list. Click Delete
Trusted Domain button.
To delete all domain names: Click Delete All button.
Page 103 / 238
Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
Firewall Protection and Content Filtering
6-27
202-10085-01, March 2005
Source MAC Filtering
Source MAC Filter will drop the Internet-bound traffic received from the PCs with the specified
MAC address.
By default, the source MAC address filter is disabled. All the traffic received from PCs with
any MAC address is allowed by default.
When enabled, Internet-bound traffic will be dropped from the PCs that have the configured
MAC addresses.
Figure 6-16:
Source MAC Filter screens
Note:
For additional ways of restricting outbound traffic, see
“Outbound Rules (Service
Blocking)” on page 6-12
.
Page 104 / 238
Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
6-28
Firewall Protection and Content Filtering
202-10085-01, March 2005
Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the firewall. Using this feature requires that you know the port numbers used by the
Application.
Once configured, operation is as follows:
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
This Router records this connection, opens the additional INCOMING port or ports associated
with this entry in the Port Triggering table, and associates them with the PC.
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
This Router matches the response to the previous request, and forwards the response to the PC.
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
Only 1 PC can use a Port Triggering application at any time.
Table 6-5.
Source MAC address filter
Item
Description
Activation
Enable the source MAC filter by ticking the check box.
Press APPLY.
Add
Now add the MAC Addresses from which the traffic should be dropped by clicking
on ADD button.
Each time one MAC Address entry can be added.
MAC Address input should be entered with ':' separator. A valid MAC address will
have 0 to 9 and A to F.
Example
: 00:e0:4c:69:0a:11
Press APPLY.
Now the traffic from the specified MAC addresses will be dropped.
Disable
To Disable Source MAC Filter, uncheck Source MAC Filter Enable check box.
The list of the MAC Addresses can be kept in the database.
If the filter has to be avoided for a specific MAC address in the database, select the
MAC address entry and click on Delete button.
Page 105 / 238
Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
Firewall Protection and Content Filtering
6-29
202-10085-01, March 2005
After a PC has finished using a Port Triggering application, there is a Time-out period before
the application can be used by another PC. This is required because this Router cannot be sure
when the application has terminated.
Figure 6-17:
Port Triggering screens
Note:
For additional ways of allowing inbound traffic, see
“Inbound Rules (Port
Forwarding)” on page 6-5
.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top