User's Manual
Table Of Contents
- Reference Manual for the Model FWAG114 Cable/ DSL Wireless ProSafe Firewall
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Chapter 4 Firewall Protection and Content Filtering
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Observe Performance, Placement, and Range Guidelines
- Implement Appropriate Wireless Security
- Understanding Wireless Settings
- Chapter 4 Firewall Protection and Content Filtering
- Firewall Protection and Content Filtering Overview
- Block Sites
- Using Rules to Block or Allow Specific Kinds of Traffic
- Services
- Using a Schedule to Block or Allow Specific Traffic
- Getting E-Mail Notifications of Event Logs and Alerts
- Viewing Logs of Web Access or Attempted Web Access
- Configuring E-Mail Alert and Web Access Log Notifications
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the Model FWAG114 Cable/DSL Wireless ProSafe Firewall
4-4 Firewall Protection and Content Filtering
You may define additional rules that will specify exceptions to the default rules. By adding custom
rules, you can block or allow access based on the service or application, source or destination IP
addresses, and time of day. You can also choose to log traffic that matches or does not match the
rule you have defined.
To create a new rule, click the Add button.
To edit an existing rule, select its button on the left side of the table and click Edit.
To delete an existing rule, select its button on the left side of the table and click Delete.
To move an existing rule to a different position in the table, select its button on the left side of the
table and click Move. At the script prompt, enter the number of the desired new position and click
OK.
An example of the menu for defining or editing a rule is shown in
Figure 4-3. The parameters are:
•Service
From this list, select the application or service to be allowed or blocked. The list already
displays many common services, but you are not limited to these choices. Use the Services
menu to add any additional services or applications that do not already appear.
• Action
Choose how you would like this type of traffic to be handled. You can block or allow always,
or you can choose to block or allow according to the schedule you have defined in the
Schedule menu.
• Source Address
Specify traffic originating on the LAN (outbound) or the WAN (inbound), and choose whether
you would like the traffic to be restricted by source IP address. You can select Any, a Single
address, or a Range. If you select a range of addresses, enter the range in the start and finish
boxes. If you select a single address, enter it in the start box.
• Destination Address
The Destination Address will be assumed to be from the opposite (LAN or WAN) of the
Source Address. As with the Source Address, you can select Any, a Single address, or a Range
unless NAT is enabled and the destination is the LAN. In that case, you must enter a Single
LAN address in the start box.
•Log
You can select whether the traffic will be logged. The choices are:
• Never - no log entries will be made for this service.
• Always - any traffic for this service type will be logged.