ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Firewall Security and Content Filtering
5-27
v1.0, October 2008
–
Protocol: Indicates the network protocol (i.e. HTTP, FTP, etc.) used by the device to
connect to the VPN firewall.
–
Int. Port (Internal Port): Indicates if any internal ports are opened by the UPnP device.
–
Ext. Port (External Port): Indicates if any external ports are opened by the UPnP device.
–
IP Address: List the IP address of the UPnP device accessing the VPN firewall.
E-Mail Notifications of Event Logs and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings you input on the
Firewall Logs & E-mail
menu. In
addition, if you have set up Content Filtering on the Block Sites screen (see
“Setting Block Sites
(Content Filtering)” on page 5-18
), a log will be generated when someone on your network tries to
access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see
“Activating Notification of
Events and Alerts” on page 11-3
.
Administrator Tips
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Enabling Remote Management Access” on page 9-10
).
2.
Although rules are the basic way of managing the traffic through your system (see
“Using
Rules & Services to Block or Allow Traffic” on page 5-2
), you can further refine your control
with the following optional features of the firewall:
•
Groups and hosts (see
“Managing Groups and Hosts (LAN Groups)” on page 3-4
)
•
Services (see
“Services-Based Rules” on page 5-2
)
•
Schedules (see
“Setting Schedules to Block or Allow Traffic” on page 5-17
)
•
Block sites (see
“Setting Block Sites (Content Filtering)” on page 5-18
)
•
Source MAC filtering (see
“Enabling Source MAC Filtering (Address Filter)” on page 5-
20
)
•
Port triggering (see
“Enabling Port Triggering” on page 5-23
)