Netgear FVS328 Reference Manual
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
6-4
Protecting Your Network
May 2004, 202-10031-01
•
Java: blocks use of Java applets
•
ActiveX: blocks use of ActiveX components (OCX files) used by IE on Windows
•
Cookies: blocks all cookies
To enable keyword blocking, check “Turn keyword blocking on”, then click Apply.
To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply.
To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
Keyword application examples:
•
If the keyword "XXX" is specified, the URL <http://www.badstuff.com/xxx.html> is blocked,
as is the newsgroup alt.pictures.XXX.
as is the newsgroup alt.pictures.XXX.
•
If the keyword “.com” is specified, only Web sites with other domain suffixes (such as .edu or
.gov) can be viewed.
.gov) can be viewed.
•
If you want to block all Internet browsing access, enter the keyword “.”.
Up to 255 entries are supported in the Keyword list.
To specify a Trusted User, enter that computer’s IP address in the Trusted User box and click
Apply. You may specify one Trusted User, which is a computer that will be exempt from blocking
and logging. Since the Trusted User will be identified by an IP address, you should configure that
computer with a fixed or reserved IP address.
Apply. You may specify one Trusted User, which is a computer that will be exempt from blocking
and logging. Since the Trusted User will be identified by an IP address, you should configure that
computer with a fixed or reserved IP address.
Services and Rules Regulate Inbound and Outbound Traffic
The FVS328 ProSafe VPN Firewall with Dial Back-up firewall lets you regulate what ports are
available to the various TCP/IP protocols. Follow these two steps to configure inbound or
outbound traffic:
available to the various TCP/IP protocols. Follow these two steps to configure inbound or
outbound traffic:
1.
Define a Service
2.
Set up an Inbound or Outbound Rule that uses the Service
These steps are discussed below.