Chapter5. Object¶
5-1. IP Address¶
5-1-1. IP Address List¶
5-1-2. IP Address Groups¶
5-2. Services¶
5-2-1. Basic Service¶
Icon |
Introduction |
Any service. |
|
TCP service such as Gopher、ICQ、Ident、LDAP、NTTP over SSL、PPTP、SFTP、SSH、Terminal、WINFRAME、AFPoverTCP、FTP、H323、L2TP、MSN Messenger、POP2、SMTP over SSL、Yahoo、AOL、Finger、HTTP、IMAP over SSL、LDAP Admin、NNTP、POP3 over SSL、RLOGIN、SMTP、VNC、BGP、GNUTella、HTTPS、IMAP、LDAPover SSL、POP3、Real Audio、Telnet、WAIS |
|
UDP service such as DNS、TFTP、NTP、SNMP、IKE、SYSLOG、RIP、UUCP and so on. |
5-2-2. Service Group¶
5-3. Schedule¶
5-4. Bandwidth Management(QoS)¶
5-4-1. QoS Settings¶
5-4-2. QoS List¶
· Basic ModeThis mode operates on a per-Zone basis, regardless of how many physical interfaces within each Zone. For example, it is suitable for applying this mode when setting up separate WAN Zones for each WAN line.· Advanced ModeThis mode operates based on physical network interfaces for bandwidth control. For example, if 3 lines are bundled into one WAN ZONE, choosing this mode will separate each line for individual management by administrators.
· Per Policy BasedWhen the bandwidth table is applied to regulations, the total number of network packets entering the regulation, whether IPv4 or IPv6, is limited to the bandwidth table setting. In other words, all source IP addresses entering the regulation share the bandwidth allocated by this bandwidth table.For example, if both 192.168.1.2 and 192.168.1.3 meet the conditions of a bandwidth table set at 10Mbps / 10Mbps, and 192.168.1.2 is utilizing 9.9Mbps / 9.9Mbps, then 192.168.1.3 can only be allocated 0.1Mbps / 0.1Mbps of bandwidth.· Per Source IP BasedWhen the Qos rule is applied to the policy, each source IP address regardless of IPv4 or IPv6, can use the bandwidth table setting. In other words, each IP address is allocated the bandwidth set by the bandwidth table. For example, if both 192.168.1.2 and 192.168.1.3 meet the conditions of a bandwidth table set at 10Mbps / 10Mbps, then 192.168.1.2 can utilize up to 10Mbps / 10Mbps, and 192.168.1.3 can also utilize up to 10Mbps / 10Mbps of bandwidth.In this mode, it is important to consider whether the total number of IP addresses and the total allocated bandwidth from bandwidth tables exceed the maximum speed provided by the interface. For example, if this policy is estimated to conclude 100 IP addresses, each allocated 20Mbps. Then when all 100 IP addresses are online and utilizing their maximum allocated bandwidth, the total bandwidth would be 100 * 20Mbps = 2000Mbps = 2G, which exceeds the maximum value of 1Gbps for the interface. Such a scenario would result in inaccurate bandwidth allocation.
note
5-5. Application Control¶
5-5-1. Application Control¶
Note
Established applications need to be assigned specific roles in firewall rules (check on Chapter 4. POLICY ) to determine their usage. For example, creating an application group and selecting which members should apply to this group in the firewall rules specify whether to allow or block access.
· DROP: Blocks applications matching the feature values.· DROP + Log: Blocks applications matching the feature values and logs the usage details.· QoS: Applies bandwidth management mechanisms to applications matching the feature values. For example, limit the network bandwidth to 500Kbps for applications like LINE/SKYPE.
5-5-2. Block Log¶
5-6. URL Filter¶
5-6-1. URL Settings¶
Note
Completed URL configurations will be displayed in a table under URL Settings.The management rules set here are just management objects; they still need to be applied to specific IP addresses in Chapter 4. POLICY.
5-6-2. Black and White List Settings¶
WEB Database Information¶
Black and White List Settings¶
For example, to block the yahoo website:- Exact Mode: Entering www.yahoo.com will only block www.yahoo.com, but www.yahoo.com.tw will still be accessible.To block all related yahoo sites, use the wildcard *, e.g., yahoo.com.*.- Fuzzy Mode: Entering yahoo will block all URLs containing yahoo. However, this increases the likelihood of false positives, as unrelated sites like abcyahoo and yahooabc may also be blocked. In this case, using the wildcard * provides more flexibility.
5-6-3. Other Settings¶
5-6-4. Log¶
5-7. DNS filter¶
5-7-1. DNS Filter¶
5-7-2. Block Log¶
5-8. Firewall Protection¶
Tip
Video Reference|NU Series UTM Tutorial: Firewall Protection System.Interface.Regulations