![NETGEAR ProSecure Appliance Reference Manual Download Page 116](http://html1.mh-extra.com/html/netgear/prosecure/prosecure_appliance-reference-manual_1672217116.webp)
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
5-2
Firewall Protection
v1.0, January 2010
Administrator Tips
Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Configuring VPN Authentication Domains, Groups, and Users” on
page 9-1
and
“Configuring Remote Management Access” on page 10-12
).
2. Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 5-3
) is
the basic way of managing the traffic through your system, you can further refine your control
using the following features and capabilities of the UTM:
–
Groups and hosts (see
“Managing Groups and Hosts (LAN Groups)” on page 4-12
)
–
Services (see
“Services-Based Rules” on page 5-3
)
–
Schedules (see
“Setting a Schedule to Block or Allow Specific Traffic” on page 5-41
)
–
Allow or block sites and applications (see
“Setting Web Access Exception Rules” on
page 6-41
)
–
Source MAC filtering (see
“Enabling Source MAC Filtering” on page 5-42
)
–
Port triggering (see
“Configuring Port Triggering” on page 5-46
)
3. Content filtering is a firewall component. The UTM provides such extensive content filtering
options that an entire chapter is dedicated to this subject; see
Chapter 6, “Content Filtering and
Optimizing Scans
.”
4. Some firewall settings might affect the performance of the UTM. For more information, see
“Performance Management” on page 10-1
.
5. You can monitor blocked content and malware threats in real-time. For more information, see
“Monitoring Real-Time Traffic, Security, and Statistics” on page 11-14
.
6. The firewall logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For information about how to
configure logging and notifications, see
“Configuring Logging, Alerts, and Event
Notifications” on page 11-5
.