Block Services - NETGEAR FVM318 Reference Manual

Cable/dsl prosafe wireless vpn security firewall
Hide thumbs Also See for FVM318:
Table of Contents

Advertisement

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
To block ActiveX, Java, Cookies, or Web Proxy functions for all Internet sites, click the check
3.
box next to the function and then click Apply.
To enable keyword blocking, check "Turn keyword blocking on", enter a keyword or domain
4.
in the Keyword box, click Add Keyword, then click Apply.
Some examples of Keyword application follow:
If the keyword "XXX" is specified, the URL <http://www.badstuff.com/xxx.html> is
blocked, as is the newsgroup alt.pictures.xxx.
If the keyword ".com" is specified, only websites with other domain suffixes (such as .edu
or .gov) can be viewed.
Enter the keyword "." to block all Internet browsing access.
Up to 32 entries are supported in the Keyword list.
To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
5.
To specify a Trusted User, enter that PC's IP address in the Trusted User box and click Apply.
6.
You may specify one Trusted User, which is a PC that will be exempt from blocking and
logging. Since the Trusted User will be identified by an IP address, you should configure that
PC with a fixed IP address.

Block Services

Firewalls are used to regulate specific traffic passing through from one side of the firewall to the
other. You can restrict outbound (LAN to WAN) traffic to what outside resources you want local
users to be able to access. In addition to the kind of blocking of sites discussed above, you can
block services like Telnet or Instant Messenger.
By default, the FR114P regulates inbound and outbound traffic in these ways:
Inbound: Block all access from outside except responses to requests from the LAN side.
Outbound: Allow all access from the LAN side to the outside.
You may define exceptions to the default outbound settings by adding Block Services definitions
to the Outbound Services table. In this way, you can block or allow access based on the service or
application destination IP addresses, and time of day. You can also choose to log traffic that
matches or does not match what you have defined.
Protecting Your Network
3-5

Advertisement

Table of Contents
loading

Table of Contents