FVS338 ProSafe VPN Firewall 50 Reference Manual

Managing Groups and Hosts

The Known PCs and Devices table on the Groups and Hosts screen contains a list of all known PCs and network devices, as well as hosts, that are assigned dynamic IP addresses by this router. Collectively, these entries make up the Network Database. The Network Database is created in two ways:

Using the DHCP Server. The router’s DHCP server will accept and respond to DHCP client requests from PCs and other network devices. Every computer that is responded to will be added to the Network Database in the Known PCs and Devices table.

Scanning the Network. The router will scan the local network periodically, using standard methods such as ARP and NetBIOS, to detect active computers or devices which are not DHCP clients. For computers that do not support the NetBIOS protocol, the name will be displayed in the known PCs and Devices table as “Unknown”.

Creating the Network Database

The Network Database offers a number of advantages:

Generally, you do not need to enter either IP address or MAC addresses. Instead, you can just select the desired PC or device.

No need to reserve an IP address for a PC in the DHCP Server. All IP address assignments made by the DHCP Server will be maintained until the PC or device is removed from the database, either by expiry (inactive for a long time) or by you.

No need to use a Fixed IP on PCs. Because the address allocated by the DHCP Server will never change, you don't need to assign a fixed IP to a PC to ensure it always has the same IP address.

MAC-level Control over PCs. The Network Database uses the MAC address to identify each PC or device. So changing a PC's IP address does not affect any restrictions on that PC.

Group and Individual Control over PCs

You can assign PCs to Groups and apply restrictions to each Group using the Firewall Rules screen (see “Services-Based Rules” on page 4-2).

You can also select the Groups to be covered by the Block Sites feature (see “Setting Block Sites (Content Filtering)” on page 4-21).

If necessary, you can also create Firewall Rules to apply to a single PC (see “Enabling Source MAC Filtering” on page 4-23). Because the MAC address is used to identify each PC, users cannot avoid these restrictions by changing their IP address.

LAN Configuration

3-5

v1.0, September 2006

Page 49
Image 49
NETGEAR FVS338 manual Managing Groups and Hosts, Creating the Network Database