ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual
LAN Configuration
3-9
v1.0, November 2007
•
Scanning the Network
. The local network is scanned using standard methods such as ARP.
This will detect active devices which are not DHCP clients. However, sometimes the name of
the PC or device cannot be accurately determined, and will be shown as Unknown.
Creating the Network Database
Some advantages of the Network Database are:
•
Generally, you do not need to enter either IP address or MAC addresses. Instead, you can just
select the desired PC or device.
•
No need to reserve an IP address for a PC in the DHCP Server. All IP address assignments
made by the DHCP Server will be maintained until the PC or device is removed from the
database, either by expiry (inactive for a long time) or by you.
•
No need to use a Fixed IP on PCs. Because the address allocated by the DHCP Server will
never change, you don't need to assign a fixed IP to a PC to ensure it always has the same IP
address.
•
MAC level control over PCs. The Network Database uses the MAC address to identify each
PC or device. So changing a PC’s IP address does not affect any restrictions on that PC.
•
Group and individual control over PCs.
–
You can assign PCs to Groups and apply restrictions to each Group using the Firewall
Rules screen (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 4-1
–
You can also select the Groups to be covered by the Block Sites feature (see
Block Sites (Content Filtering)” on page 4-27
).
–
If necessary, you can also create Firewall Rules to apply to a single PC (see
). Because the MAC address is used to identify each PC,
users cannot avoid these restrictions by changing their IP address.
•
A computer is identified by its MAC address—not its IP address. Hence, changing a
computer’s IP address does not affect any restrictions applied to that PC.
This
Known PCs and Devices
table lists entries in the Network Database. For each computer or
device, the following fields are displayed:
•
Name
: The name of the PC or device. For computers that do not support the NetBIOS
protocol, this will be listed as “Unknown” (you can edit the entry manually to add a
meaningful name). If the computer was assigned an IP address by the DHCP server, then the
Name will be appended by an asterisk.
Summary of Contents for ProSafe Quad WAN FR538G
Page 12: ...xii Contents v1 0 November 2007...
Page 16: ...ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual xvi v1 0 November 2007...
Page 26: ...ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual 1 10 Introduction v1 0 November 2007...
Page 27: ...ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual Introduction 1 11 v1 0 November 2007...
Page 28: ...ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual 1 12 Introduction v1 0 November 2007...