Page 41 / 66 Scroll up to view Page 36 - 40
Security Setup
40
To create an Internet access policy:
1.
Select a number from the
Access Policy
dropdown menu.
2.
Enter a policy name in the field provided.
3.
To enable the policy, select
Enabled
.
4.
To select which PCs are affected by the policy, click
Edit List
. The List
of PCs screen appears. You can select a PC by MAC Address or IP
Address. You can also enter a range of IP Addresses if you want the
policy to affect a group of PCs. After making your changes, click
Save
Settings
to apply your changes or
Cancel Changes
to cancel your
changes. Then click
Close
.
5.
Select the appropriate option,
Deny
or
Allow
, depending on whether
you want to block or allow Internet access for the PCs you listed on the
List of PCs screen. If
Deny
is selected, the PCs listed are not allowed
to access the Internet under the current policy. If
Allow
is selected, the
PCs listed are blocked some the Internet under the current policy. PCs
that are not listed under the policy are allowed to access the Internet.
6.
Decide which days and what times you want this policy to be enforced.
Select the individual days during which the policy will be in effect, or
select
Everyday
. To set times for the policy, select
24 Hours
, and
enter the times you want.
7.
To filter websites by URL, enter URLs in the
Website Blocking by
URL Address
fields. To filter websites by keywords, enter keywords in
the
Website Blocking by Keyword
fields.
8.
To filter access to various services accessed over the Internet, such as
FTP or telnet, add an application into
Blocked Applications
. (You can
Page 42 / 66
Security Setup
41
only add up to 4 applications.) Enter the information in the
Application
Name
and
Port Range
fields and select the
Protocol
type, then click
Add
. To modify an existing application, select the application from the
Blocked List, make the appropriate changes and click
Modify
. To
delete an existing application from the Blocked List, select the
application and click
Delete
.
Page 43 / 66
Security Setup
42
Single Port Forward
Single Port Forwarding
Port Forwarding allows you to set up public services on your network,
such as web servers, ftp servers, e-mail servers, and other specialized
Internet applications.
To forward a single port:
1. Click
Add
.
2. In the
Application
field, enter the name of your application.
3. In the
Protocol
field,
select the protocol used for this application:
TCP, UDP, or Both.
4. In the
Port (External)
field,
enter the port number of the external
port used by the server or Internet application.
5. In the
Port (Internal)
field,
enter the port number of the internal port
used by the server or Internet application.
6. In the
LAN IP
field,
enter the IP address of the PC running the
specific application.
7. Activate/deactivate the
Enabled
checkbox to enable/disable the
client’s DHCP IP reservation.
To apply the changes, click
Apply
.
To cancel the latest changes without saving the changes, click
Undo
.
To delete a port forwarding rule, activate the appropriate checkbox in the
Select
column and click
Del
.
Page 44 / 66
Security Setup
43
Port Range Forward
Port Range Forwarding
Port Range Forwarding allows you to set up public services on your
network, such as web servers, ftp servers, e-mail servers, and other
specialized Internet applications.
To forward a port range:
1. Click
Add
.
2. In the
Application
field,
enter the name of your application.
3. In the
Protocol
field,
select the protocol used for this application:
TCP, UDP, or Both.
4. In the
WAN Port (Begin)
field,
enter the beginning port number
used by the server or Internet application.
5. In the
WAN Port (End)
field,
enter the end port number used by the
server or Internet application.
6. In the
LAN IP
field,
enter the IP address of the PC running the
specific application.
7. Activate/deactivate the
Enabled
checkbox to enable/disable the
client’s DHCP IP reservation.
To apply the changes, click
Apply
.
To cancel the latest changes without saving the changes, click
Undo
.
To delete a port forwarding rule, activate the appropriate checkbox in the
Select
column and click
Del
.
Page 45 / 66
Security Setup
44
Port Range Trigger
Port Range Triggering
This feature allows the Router to watch outgoing data for specific port
numbers. The Router remembers the IP address of the computer that
sends the matching data, so that when the requested data returns
through the Router, the data is pulled back to the proper computer by way
of IP address and port mapping rules.
To add a new port range triggering:
1. Click
Add
.
2. In the
Application
field,
enter the name of your application.
3. In the
Triggered Range
field,
enter the triggered port number range
for each application. Check with the Internet application
documentation for the port number needed. Enter the starting port
number of the Triggered Range in the left field. Enter the ending
port number of the Triggered Range in the right field.
4. In the
Forwarded Range
field,
enter the forwarded port number
range for each application. Check with the Internet application
documentation for the port number needed. Enter the ending port
number of the Triggered Range in the right field.
5. Activate/deactivate the
Enabled
checkbox to enable/disable the
client’s DHCP IP reservation.
To apply the changes, click
Apply
.
To cancel the latest changes without saving the changes, click
Undo
.
To delete a port triggering rule, activate the appropriate checkbox in the
Select
column and click
Del
.

Rate

4.5 / 5 based on 2 votes.

Popular Bandluxe Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top