ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

Table 5-2. Outbound Rules Overview

Setting

Description (or Subfield and Description)

 

 

Service

The service or application to be covered by this rule. If the service or application does

 

not appear in the list, you must define it using the Services menu (see “Adding

 

Customized Services” on page 5-30).

 

 

Action (Filter)

The action for outgoing connections covered by this rule:

 

• BLOCK always.

 

• BLOCK by schedule, otherwise allow.

 

• ALLOW always.

 

• ALLOW by schedule, otherwise block.

 

Note: Any outbound traffic that is not blocked by rules you create is allowed by the

 

default rule.

 

ALLOW rules are only useful if the traffic is already covered by a BLOCK rule. That

 

is, you wish to allow a subset of traffic that is currently blocked by another rule.

 

 

Select Schedule

The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this

 

rule.

 

• This pull-down menu is activated only when “BLOCK by schedule, otherwise allow”

 

or “ALLOW by schedule, otherwise block” is selected as the Action.

 

• Use the schedule screen to configure the time schedules (see “Setting a Schedule

 

to Block or Allow Specific Traffic” on page 5-39).

 

 

LAN Users

The settings that determine which computers on your network are affected by this

 

rule. The options are:

 

• Any. All PCs and devices on your LAN.

 

• Single address. Enter the required address to apply the rule to a single device on

 

your LAN.

 

• Address range. Enter the required addresses in the Start and Finish fields to apply

 

the rule to a range of devices.

 

• Groups. Select the Group to which the rule applies. Use the LAN Groups screen

 

(under Network Configuration) to assign PCs to Groups. See “Managing Groups

 

and Hosts (LAN Groups)” on page 4-12.

 

 

WAN Users

The settings that determine which Internet locations are covered by the rule, based

 

on their IP address. The options are:

 

• Any. All Internet IP address are covered by this rule.

 

• Single address. Enter the required address in the start field.

 

• Address range. Enter the Start and Finish fields.

 

 

DMZ Users

The settings that determine which DMZ computers on the DMZ network are affected

 

by this rule. The options are:

 

• Any. All PCs and devices on your DMZ network.

 

• Single address. Enter the required address to apply the rule to a single PC on the

 

DMZ network.

 

• Address range. Enter the required addresses in the Start and Finish fields to apply

 

the rule to a range of DMZ computers.

 

 

 

 

Firewall Protection

5-5

v1.0, September 2009

Page 119
Image 119
NETGEAR UTM25EW-100NAS manual Outbound Rules Overview, Customized Services on, To Block or Allow Specific Traffic on