Netgear UTM10EW3-100NAS Reference Manual 3.0.1-124 - Page 246
Table 56., Application Control Policy pop-up screen settings
View all Netgear UTM10EW3-100NAS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 246 highlights
ProSecure Unified Threat Management (UTM) Appliance 6. Configure the policy as explained in the following table: Table 56. Application Control Policy pop-up screen settings Setting Description Policy for a category of applications Application Policy From the drop-down list, select the action for the policy of the selected category of applications: • Allow. The applications in the selected category are allowed. • Drop. The applications in the selected category are blocked. • Log Only. The applications in the selected category are allowed, but traffic is logged. Bandwidth Profile From the drop-down list, select the bandwidth profile that is assigned to the selected category of applications, or leave the default selection (None). By default, no profile is assigned. For information about bandwidth profiles, see Create Bandwidth Profiles on page 171. Traffic Meter Profile From the drop-down list, select the traffic meter profile that is assigned to the selected category of applications, or leave the default selection (None). By default, no profile is assigned. For information about traffic meter profiles, see Create Traffic Meter Profiles on page 174. QoS Profile From the drop-down list, select the QoS profile that is assigned to the selected category of applications, or leave the default selection (None). By default, no profile is assigned. For information about QoS profiles, see Create Quality of Service Profiles on page 169. Policy for an individual application Note: The content of a pop-up screen for an individual application depends on the application. The previous figure is just an example for one application. Application Policy (action) for all behaviors From the drop-down list, select the action for the policy of the selected application: • Allow. The application is allowed. • Drop. The application is blocked. • Log Only. The application is allowed, but traffic is logged. Specify the action(s) for each behavior. Note: This option is displayed for select applications only. If access to an application consists of two steps such as first logging in and then connecting, you can select the action for each step: • Login. From the drop-down list, select the action: - Allow. Logging in to the application is allowed. - Drop. Logging in to the application is blocked. - Log Only. Logging in to the application is allowed, but traffic is logged. • Connect. From the drop-down list, select the action: - Allow. Connecting to the application is allowed. - Drop. Connecting to the application is blocked. - Log Only. Connecting to the application is allowed, but traffic is logged. Content Filtering and Optimizing Scans 246