66
|
Chapter 4:
Firewall Protection and Content Filtering
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
To enable IP/MAC address binding enforcement and alerts:
1.
Select Security > Address Filter from the menu.
2.
Select the
IP/MAC Binding
tab to display the Source MAC Filter screen.
3.
In the
Email IP/MAC Violations
section of the screen, check the
Yes
radio button to
enable IP/MAC address binding enforcement and alerts. E-mail alerts must be enabled
(see
“E-Mail Notifications of Event Logs and Alerts”
on page 68).
4.
Click
Apply.
5.
To add a manual binding entry, enter the following data in the
Add IP/MAC Bindings
section:
a.
Enter a
Name
for the bound host device.
b.
Enter the
MAC Address
and
IP Address
to be bound. A valid MAC address is six
colon-separated pairs of hexadecimal digits (0 to 9 and a to f). For example:
01:23:45:ab:cd:ef.
c.
From the pull-down list, select whether dropped packets should be logged to a
special counter.
6.
Click
Apply
. The specified binding will be added to the
IP/MAC Bindings
table.
To see the counter that shows the packets that were dropped because of IP-MAC binding
violations and to set the poll interval, click the
Set Poll Interval
link at the top of the IP/MAC
Binding screen.
Configuring Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the VPN firewall when it functions in NAT mode. Some applications require that
when external devices connect to them, they receive data on a specific port or range of ports.
The VPN firewall must send all incoming data for that application only on the required port or