User's Manual
Table Of Contents
- Reference Manual for the Model FWAG114 Cable/ DSL Wireless ProSafe Firewall
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Chapter 4 Firewall Protection and Content Filtering
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Observe Performance, Placement, and Range Guidelines
- Implement Appropriate Wireless Security
- Understanding Wireless Settings
- Chapter 4 Firewall Protection and Content Filtering
- Firewall Protection and Content Filtering Overview
- Block Sites
- Using Rules to Block or Allow Specific Kinds of Traffic
- Services
- Using a Schedule to Block or Allow Specific Traffic
- Getting E-Mail Notifications of Event Logs and Alerts
- Viewing Logs of Web Access or Attempted Web Access
- Configuring E-Mail Alert and Web Access Log Notifications
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the Model FWAG114 Cable/DSL Wireless ProSafe Firewall
Firewall Protection and Content Filtering 4-9
Order of Precedence for Rules
As you define new rules, they are added to the tables in the Rules menu, as shown in
Figure 4-6:
Figure 4-6: Rules table with examples
For any traffic attempting to pass through the firewall, the packet information is subjected to the
rules in the order shown in the Rules Table, beginning at the top and proceeding to the default rules
at the bottom. In some cases, the order of precedence of two or more rules may be important in
determining the disposition of a packet. The Move button allows you to relocate a defined rule to a
new position in the table.
Default DMZ Server
Incoming traffic from the Internet is normally discarded by the router unless the traffic is a
response to one of your local computers or a service for which you have configured an inbound
rule. Instead of discarding this traffic, you can have it forwarded to one computer on your network.
This computer is called the Default DMZ Server.