Netgear FVS318N – Prosafe Wireless N VPN Firewall 参照マニュアル

ページ / 426
Network and System Management
326
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N 
WARNING:
Incorrect configuration of outbound firewall rules can cause 
serious connection problems.
Each rule lets you specify the desired action for the connections that are covered by the rule:
BLOCK always 
BLOCK by schedule, otherwise allow 
ALLOW always 
ALLOW by schedule, otherwise block 
The following section summarizes the various criteria that you can apply to outbound rules in 
order to reduce traffic. For more information about outbound rules, see 
132. For detailed procedures about how to configure outbound 
139 and 
146.
When you define outbound firewall rules, you can further refine their application according to 
the following criteria:
Services. You can specify the services or applications to be covered by an outbound rule. 
If the desired service or application does not display in the list, you need to define it using 
the Services screen (see 
LAN users (or DMZ users). You can specify which computers on your network are 
affected by an outbound rule. There are several options:
-
Any. The rule applies to all computers and devices on your LAN. 
-
Single address. The rule applies to the address of a particular computer. 
-
Address range. The rule applies to a range of addresses.
-
Groups. The rule applies to a group of computers. (You can configure groups for LAN 
WAN outbound rules but not for DMZ WAN outbound rules.) The Known PCs and 
Devices table is an automatically maintained list of all known computers and network 
devices and is generally referred to as the network database, which is described in 
entered into the network database by various methods, which are described in 
68.
WAN users. You can specify which Internet locations are covered by an outbound rule, 
based on their IP address:
-
Any. The rule applies to all Internet IP address. 
-
Single address. The rule applies to a single Internet IP address. 
-
Address range. The rule applies to a range of Internet IP addresses. 
Schedule. You can configure three different schedules to specify when a rule is applied. 
Once a schedule is configured, it affects all rules that use this schedule. You specify the