Page 36 / 65 Scroll up to view Page 31 - 35
Security Setup
35
Internet Access Policy
Access can be managed by a policy. Use the settings on this screen to
establish and access policies. To display a policy’s settings, select the
policy from the drop-down menu. To delete a policy, select the policy’s
number and click
Delete This Policy
. To view all the policies, click
Summary
. To delete multiple policies, in the Summary screen, selecting
the policies and click
Delete
).
Page 37 / 65
Security Setup
36
To create an Internet access policy:
1.
Select a number from the
Access Policy
dropdown menu.
2.
Enter a policy name in the field provided.
3.
To enable the policy, select
Enabled
.
4.
To select which PCs are affected by the policy, click
Edit List
. The List
of PCs screen appears. You can select a PC by MAC Address or IP
Address. You can also enter a range of IP Addresses if you want the
policy to affect a group of PCs. After making your changes, click
Save
Settings
to apply your changes or
Cancel Changes
to cancel your
changes. Then click
Close
.
5.
Select the appropriate option, Deny or Allow, depending on whether
you want to block or allow Internet access for the PCs you listed on the
List of PCs screen.
6.
Decide which days and what times you want this policy to be enforced.
Select the individual days during which the policy will be in effect, or
select
Everyday
. To set times for the policy, select
24 Hours
, and
enter the times you want.
7.
To filter websites by URL, enter URLs in the
Website Blocking by
URL Address
fields. To filter websites by keywords, enter keywords in
the
Website Blocking by Keyword
fields.
8.
To filter access to various services accessed over the Internet, such as
FTP or telnet, select services in the
Applications
column, and click
Add
to add them to the Blocked List. (You can only add up to 3
applications.) You can also add an application into the
Applications
column. Enter the information in the
Application Name
,
Port Range
Page 38 / 65
Security Setup
37
and
Protocol
fileds, and click
Add
.
Single Port Forward
Single Port Forwarding
Port Forwarding allows you to set up public services on your network,
such as web servers, ftp servers, e-mail servers, and other specialized
Internet applications. To forward a port, enter the information in each field.
Application Name:
You can select an application from the 10 preset applications
in the drop-down menu. For custom applications, enter the name of your application in
one of the available fields.
External Port:
Enter the port number of external ports used by the server or
Internet application.
Internal Port:
Enter the port number of internal ports used by the server or Internet
application.
Protocol:
Select the protocol used for this application: TCP, UDP, or Both.
To IP address:
For each application, enter the IP address of the PC running the
specific application.
Enabled:
To enable port forwarding for the application, select
Enabled
.
To apply the changes, click
Save Settings
.
Page 39 / 65
Security Setup
38
Port Range Forward
Port Range Forwarding
Port Range Forwarding allows you to set up public services on your
network, such as web servers, ftp servers, e-mail servers, and other
specialized Internet applications.
Application Name:
Enter the name of your application.
Start - End Port:
Enter the number that starts the port range in the left
field and the number that ends the range in the right field.
Protocol:
Select the protocol used for this application:
TCP
,
UDP
, or
Both
.
To IP address:
For each application, enter the IP address of the PC
running the specific application.
Enabled:
To enable port forwarding for the application, click the
Enabled
checkbox to enable port forwarding for the relevant application.
To apply the changes, click
Save Settings
.
Page 40 / 65
Security Setup
39
Port Range Trigger
Port Range Triggering
This feature allows the Router to watch outgoing data for specific port
numbers. The Router remembers the IP address of the computer that
sends the matching data, so that when the requested data returns
through the Router, the data is pulled back to the proper computer by way
of IP address and port mapping rules.
Application Name:
Enter the application name of the trigger.
Triggered Range:
For each application, enter the triggered port number
range. Check with the Internet application documentation for the port
number needed. Enter the starting port number of the Triggered Range in
the left field. Enter the ending port number of the Triggered Range in the
right field.
Forwarded Range:
For each application, enter the forwarded port
number range. Check with the Internet application documentation for the
port number needed. Enter the ending port number of the Triggered
Range in the right field.
Enabled:
To enable port triggering for the application, select
Enabled
.

Rate

3.5 / 5 based on 2 votes.

Popular Bandluxe Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top