Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules 参照マニュアル

ページ / 631
Firewall Protection
168
ProSecure Unified Threat Management (UTM) Appliance 
3. 
Click the Add table button. The new IP/MAC rule is added to the IP/MAC Bindings table.
4. 
Click Apply to save your changes. 
To edit an IP/MAC binding:
1. 
In the IP/MAC Bindings table, click the Edit table button to the right of the IP/MAC 
binding that you want to edit. The Edit IP/MAC Binding screen displays.
2. 
Modify the settings that you wish to change (see the previous table).
3. 
Click Apply to save your changes. The modified IP/MAC binding displays in the IP/MAC 
Bindings table.
To remove one or more IP/MAC bindings from the table:
1. 
Select the check box to the left of each IP/MAC binding that you want to delete, or click 
the Select All table button to select all bindings.
2. 
Click the Delete table button.
Configure Port Triggering
Port triggering allows some applications running on a LAN network to be available to external 
applications that would otherwise be partially blocked by the firewall. Using the port-triggering 
feature requires that you know the port numbers used by the application. 
Once configured, port triggering operates as follows: 
1. 
A PC makes an outgoing connection using a port number that is defined in the Port 
Triggering Rules table. 
2. 
The UTM records this connection, opens the additional incoming port or ports that are 
associated with the rule in the port triggering table, and associates them with the PC. 
3. 
The remote system receives the PC’s request and responds using the incoming port or ports 
that are associated with the rule in the port triggering table on the UTM. 
4. 
The UTM matches the response to the previous request and forwards the response to the 
PC. 
Without port triggering, the response from the external application would be treated as a new 
connection request rather than a response to a request from the LAN network. As such, it 
would be handled in accordance with the inbound port-forwarding rules, and most likely 
would be blocked.
IP Address
The IP address of the PC or device that is bound to the MAC address.
Log Dropped 
Packets
To log the dropped packets, select Enable from the drop-down list. The default setting 
is Disable.
Table 35.  IP/MAC Binding screen settings (continued)
Setting
Description