ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering 4-35
v1.0, August 2006

Administrator Tips

Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites from a
central location (see “Enabling Remote Management Access” on page 6-10).
2. Although rules (see “Using Rules to Block or Allow Specific Kinds of T raffic” on page 4-1) is
the basic way of managing t he traf fic through your system, you can further refin e your control
with the following optional features of the VPN firewall:
Groups and hosts (see “Managing Groups and Hosts (LAN Groups)” on page 3-6 )
Services (see “Services-Based Rules” on page 4-2)
Schedules (see “Setting a Schedule to Block or Allow Specific Traffic” on page 4-24)
Block sites (see “Setting Block Sites (Content Filtering)” on page 4-25)
Source MAC filtering (see “Enabling Source MAC Filtering” on page 4-27)
Port triggering (see “Port Triggering” on page 4-28)
Table 4-4. Firewall Log Field Descriptions
Field Description
Date and Time The date and time the log entry was recorded.
Description or Action The type of event and what action was taken if any.
Source IP The IP address of the initiating device for this log entry.
Source port and
interface The service port number of the initiating device, and whether it originated from the
LAN, WAN or DMZ.
Destination The name or IP address of the destination device or Web site.
Destination port and
interface The service port number of the destination device, and whether it’s on the LAN,
WAN or DMZ.