Netgear FVS336G 参照ガイド

ページ / 233
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Firewall Protection and Content Filtering
4-25
v1.0, October 2007
4. From the Protocol pull-down menu, choose either TCP or UDP transport protocol. 
5. In the Outgoing (Trigger) Port Range fields:
a. Enter the Start Port range (1 - 65534).
b. Enter the End Port range (1 - 65534).
6. In the Incoming (Response) Port Range fields:
a. Enter the Start Port range (1 - 65534).
b. Enter the End Port range (1 - 65534).
7. Click Add. The port triggering rule will be added to the Port Triggering Rules table.
To check the status of the port triggering rules, click the Status option arrow to the right of the tab 
on the Port Triggering screen.
E-Mail Notifications of Event Logs and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack 
information, and other information to a specified e-mail address. For example, your VPN firewall 
will log security-related events such as: accepted and dropped packets on different segments of 
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and 
other general information based on the settings you input on the Firewall Logs & E-mail menu. In 
addition, if you have set up Content Filtering on the Block Sites screen (see 
), a log will be generated when someone on your network tries to 
access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see 
.
Administrator Tips
Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites from a 
central location (see 
2. Although rules (see 
are the basic way of managing the traffic through your system, you can further refine your 
control with the following optional features of the VPN firewall: