NETGEAR UTM25EW-100NAS Router User Manual


 
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
5-2 Firewall Protection
v1.0, September 2009
Administrator Tips
Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites from a
central location (see “Configuring VPN Authentication Domains, Groups, and Users” on
page 9-1 and “Configuring Remote Management Access” on page 10-12).
2. Although rules (see “Using Rules to Block or Allow Specific Kinds of Traffic” on page 5-3) is
the basic way of managing the traffic through your system, you can further refine your control
using the following features and capabilities of the UTM:
Groups and hosts (see “Managing Groups and Hosts (LAN Groups)” on page 4-12)
Services (see “Services-Based Rules” on page 5-3)
Schedules (see “Setting a Schedule to Block or Allow Specific Traffic” on page 5-39)
Allow or block sites and applications (see “Setting Web Access Exception Rules” on
page 6-41)
Source MAC filtering (see “Enabling Source MAC Filtering” on page 5-40)
Port triggering (see “Configuring Port Triggering” on page 5-44)
3. Content filtering is a firewall component. The UTM provides such extensive content filtering
options that an entire chapter is dedicated to this subject; see Chapter 6, “Content Filtering and
Optimizing Scans.”
4. Some firewall settings might affect the performance of the UTM. For more information, see
“Performance Management” on page 10-1.
5. You can monitor blocked content and malware threats in real-time. For more information, see
“Monitoring Real-Time Traffic, Security, and Statistics” on page 11-14.
6. The firewall logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For information about how to
configure logging and notifications, see “Configuring Logging, Alerts, and Event
Notifications” on page 11-5.