Netgear UTM5 Instrukcja Użytkownika Strona 9

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 484
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 8
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
ix
v1.0, January 2010
Configuring Secondary WAN Addresses ......................................................................3-17
Configuring Dynamic DNS ............................................................................................3-19
Configuring Advanced WAN Options ............................................................................3-22
Additional WAN-Related Configuration Tasks ........................................................3-24
Chapter 4
LAN Configuration
Managing Virtual LANs and DHCP Options ...................................................................4-1
Managing the UTM’s Port-Based VLANs .................................................................4-2
VLAN DHCP Options ...............................................................................................4-4
Configuring a VLAN Profile ......................................................................................4-6
Configuring Multi-Home LAN IPs on the Default VLAN ................................................ 4-11
Managing Groups and Hosts (LAN Groups) .................................................................4-12
Managing the Network Database ...........................................................................4-13
Changing Group Names in the Network Database ................................................4-16
Setting Up Address Reservation ............................................................................4-17
Configuring and Enabling the DMZ Port .......................................................................4-18
Managing Routing ........................................................................................................4-22
Configuring Static Routes .......................................................................................4-23
Configuring Routing Information Protocol (RIP) .....................................................4-24
Static Route Example .............................................................................................4-27
Chapter 5
Firewall Protection
About Firewall Protection ................................................................................................5-1
Administrator Tips ....................................................................................................5-2
Using Rules to Block or Allow Specific Kinds of Traffic ..................................................5-3
Services-Based Rules ..............................................................................................5-3
Order of Precedence for Rules ..............................................................................5-11
Setting LAN WAN Rules ........................................................................................5-12
Setting DMZ WAN Rules ........................................................................................5-15
Setting LAN DMZ Rules .........................................................................................5-19
Inbound Rules Examples .......................................................................................5-22
Outbound Rules Example ......................................................................................5-26
Configuring Other Firewall Features .............................................................................5-27
Attack Checks ........................................................................................................5-27
Setting Session Limits ............................................................................................5-30
Przeglądanie stron 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 483 484

Komentarze do niniejszej Instrukcji

Brak uwag