Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules Manual De Referência
Firewall Protection
152
ProSecure Unified Threat Management (UTM) Appliance
Create Services, QoS Profiles, and Bandwidth Profiles
When you create inbound and outbound firewall rules, you use firewall objects such as
services, service groups, IP groups (LAN and WAN groups), QoS profiles, bandwidth profiles,
and schedules to narrow down the firewall rules:
services, service groups, IP groups (LAN and WAN groups), QoS profiles, bandwidth profiles,
and schedules to narrow down the firewall rules:
•
Services. A service narrows down the firewall rule to an application and a port number.
You can also narrow down the firewall rule to a group of services. For information about
adding services and service groups, see
adding services and service groups, see
•
IP groups. An IP group is a LAN group or a WAN group to which you add individual IP
addresses. You can narrow down the firewall rule to such an IP group. For information
about creating IP groups, see
about creating IP groups, see
•
QoS profiles. A Quality of Service (QoS) profile defines the relative priority of an IP
packet for traffic that matches the firewall rule. For information about creating QoS
profiles, see
profiles, see
•
Bandwidth profiles. A bandwidth profile allocates and limits traffic bandwidth for the LAN
users to which a firewall rule is applied. For information about creating bandwidth profiles,
see
see
Note:
A schedule narrows down the period during which a firewall rule is
applied. For information about specifying schedules, see
Add Customized Services
Services are functions performed by server computers at the request of client computers. You
can configure up to 125 custom services.
can configure up to 125 custom services.
For example, web servers serve web pages, time servers serve time and date information,
and game hosts serve data about other players’ moves. When a computer on the Internet
sends a request for service to a server computer, the requested service is identified by a
service or port number. This number appears as the destination port number in the
transmitted IP packets. For example, a packet that is sent with destination port number 80 is
an HTTP (web server) request.
and game hosts serve data about other players’ moves. When a computer on the Internet
sends a request for service to a server computer, the requested service is identified by a
service or port number. This number appears as the destination port number in the
transmitted IP packets. For example, a packet that is sent with destination port number 80 is
an HTTP (web server) request.
The service numbers for many common protocols are defined by the Internet Engineering
Task Force (IETF) and published in RFC 1700, Assigned Numbers. Service numbers for
other applications are typically chosen from the range 1024 to 65535 by the authors of the
application.
Task Force (IETF) and published in RFC 1700, Assigned Numbers. Service numbers for
other applications are typically chosen from the range 1024 to 65535 by the authors of the
application.
Although the UTM already holds a list of many service port numbers, you are not limited to
these choices. Use the Services screen to add additional services and applications to the list
for use in defining firewall rules. The Services screen shows a list of services that you have
defined, as shown in
these choices. Use the Services screen to add additional services and applications to the list
for use in defining firewall rules. The Services screen shows a list of services that you have
defined, as shown in