Page 176 / 414 Scroll up to view Page 171 - 175
Firewall Protection
176
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Figure 94.
2.
In the Content Filtering section of the screen, select the
Yes
radio button.
Page 177 / 414
Firewall Protection
177
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
3.
In the Web Components section of the screen, select the components that you want to block
(by default, none of these components are blocked, that is, none of these check boxes are
selected):
Proxy
. Blocks proxy servers.
Java
. Blocks Java applets from being downloaded.
ActiveX
. Blocks ActiveX applets from being downloaded.
Cookies
. Blocks cookies from being created by a website.
These components are explained in the introduction of this section on page 174.
4.
Click
Apply
to enable content filtering and blocking of the selected web components. The
screen controls are activated.
To apply keyword blocking to LAN groups:
1.
In the Apply Keyword Blocking to section of the screen, select the check boxes for the
groups to which you want to apply keyword blocking, or click the
Select All
button to
select all groups.
2.
To activate keyword blocking for these groups, click the
Enable
button. To deactivate
keyword blocking for the selected groups, click the
Disable
button.
Note:
If you changed the LAN group names on the Edit Group Names
screen (see
Change Group Names in the Network Database
on
page 68), the new names are displayed on the Block Sites screen.
To build your list of blocked keywords or blocked domain names:
1.
In the Add Blocked Keyword section of the screen, in the Blocked Keyword field, enter a
keyword or domain name.
2.
After each entry, click the
Add
table button. The keyword or domain name is added to the
Blocked Keywords table.
To edit an entry, click the
Edit
table button in the Action column adjacent to the entry.
To build your list of trusted domains:
1.
In the Add Trusted Domain section of the screen, in the Trusted Domains field, enter a
domain name.
2.
After each entry, click the
Add
table button. The domain name is added to the Trusted
Domains table.
To edit an entry, click the
Edit
table button in the Action column adjacent to the entry.
Page 178 / 414
Firewall Protection
178
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Set a Schedule to Block or Allow Specific Traffic
Schedules define the time frames under which firewall rules can be applied. Three
schedules, Schedule 1, Schedule 2, and Schedule 3, can be defined, and you can select any
one of these when defining firewall rules.
To set a schedule:
1.
Select
Security > Services > Schedule 1
.
The Schedule 1 screen displays:
Figure 95.
2.
In the Scheduled Days section, select one of the following radio buttons:
All Days
. The schedule is in effect all days of the week.
Specific Days
. The schedule is in effect only on specific days. To the right of the radio
buttons, select the check box for each day that you want the schedule to be in effect.
3.
In the Scheduled Time of Day section, select one of the following radio buttons:
All Day
. The schedule is in effect all hours of the selected day or days.
Specific Times
. The schedule is in effect only during specific hours of the selected
day or days. To the right of the radio buttons, fill in the Start Time and End Time fields
(Hour, Minute, AM/PM) during which the schedule is in effect.
4.
Click
Apply
to save your settings to Schedule 1.
Repeat these steps to set to a schedule for Schedule 2 and Schedule 3.
Page 179 / 414
Firewall Protection
179
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Enable Source MAC Filtering
The Source MAC Filter screen enables you to permit or block traffic coming from certain
known computers or devices.
By default, the source MAC address filter is disabled. All the traffic received from computers
with any MAC address is allowed. When the source MAC address filter is enabled,
depending on the selected policy, traffic is either permitted or blocked if it comes from any
computers or devices whose MAC addresses are listed in MAC Addresses table.
Note:
For additional ways of restricting outbound traffic, see
Outbound
Rules (Service Blocking)
on page 127.
To enable MAC filtering and add MAC addresses to be permitted or blocked:
1.
Select
Security > Address Filter
. The Address Filter submenu tabs display, with the
Source MAC Filter screen in view. (The following figure shows one address in the MAC
Addresses table as an example.)
Figure 96.
2.
In the MAC Filtering Enable section, select the
Yes
radio button.
3.
In the same section, from the Policy for MAC Addresses listed below drop-down list, select
one of the following options:
Block and Permit the rest
. Traffic coming from all addresses in the MAC Addresses
table is blocked. Traffic from all other MAC addresses is permitted.
Permit and Block the rest
. Traffic coming from all addresses in the MAC Addresses
table is permitted. Traffic from all other MAC addresses is blocked.
Page 180 / 414
Firewall Protection
180
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
4.
Click
Apply
to save your settings. The MAC Address field in the Add Source MAC Address
section of the screen now becomes available.
5.
Build your list of source MAC addresses to be permitted or blocked by entering the first MAC
address in the MAC Address field. A MAC address needs to be entered in the format
xx:xx:xx:xx:xx:xx, in which x is a numeric (0 to 9) or a letter between a and f (inclusive), for
example: aa:11:bb:22:cc:33.
WARNING:
If you select Permit and Block the rest from the drop-down list but
do not add the MAC address of the computer from which you are
accessing the web management interface, you are locked out of
the web management interface.
6.
Click the
Add
table button. The MAC address is added to the MAC Addresses table.
7.
Repeat the previous two steps to add more MAC addresses to the MAC Addresses table.
To remove one or more MAC addresses from the table:
1.
Select the check box to the left of each MAC address that you want to delete, or click
the
Select All
table button to select all addresses.
2.
Click the
Delete
table button.
Set Up IP/MAC Bindings
IP/MAC binding allows you to bind an IPv4 or IPv6 address to a MAC address and the other
way around. Some computers or devices are configured with static addresses. To prevent
users from changing their static IP addresses, the IP/MAC binding feature needs to be
enabled on the wireless VPN firewall. If the wireless VPN firewall detects packets with an IP
address that matches the IP address in the IP/MAC Bindings table but does not match the
related MAC address in the IP/MAC Bindings table (or the other way around), the packets are
dropped. If you have enabled the logging option for the IP/MAC binding feature, these
packets are logged before they are dropped. The wireless VPN firewall displays the total
number of dropped packets that violate either the IP-to-MAC binding or the MAC-to-IP
binding.
Note:
You can bind IP addresses to MAC addresses for DHCP assignment
on the LAN Groups submenu. See
Manage the Network Database
on page 65.
As an example, assume that three computers on the LAN are set up as follows, and that their
IPv4 and MAC addresses are added to the IP/MAC Bindings table:
Host 1. MAC address (00:01:02:03:04:05) and IP address (192.168.10.10)
Host 2. MAC address (00:01:02:03:04:06) and IP address (192.168.10.11)

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top