Page 31 / 60 Scroll up to view Page 26 - 30
The second section is used to configure Access Rules for the Private LAN to the Internet.
These
rules will block services on the private LAN to the Internet.
From this section, you can also choose to have the Gateway to [Respond to Ping on Internet
WAN Port].
If you check this option, the Gateway will respond to PING requests to the WAN IP
address.
By default this option is enabled.
For convenience, each Access Control section includes 2 filtering options:
Predefined Filtering
Customer Defined Filtering
Predefined Filtering Access Rule:
1.
On the Side Navigation bar, click on [Firewall] then select [Access Control]
2.
Under the Predefined Section, click on the [Add] button
3.
On the Predefined Filter page, select the service that you want to block from the pull-
down menu
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 60
4.
Select the [LAN IPs] that you want this access rule to apply to. You can choose to apply
this rule to Any IP Address, a Single IP Address, or a Range of IP Addresses.
a.
Any IP Address [Any] – choose this option to block all LAN clients.
You don’t
need to configure the [Start IP] or [End IP] options.
b.
Single IP Address [Single address] – choose this option to block a single LAN
client.
Enter the LAN IP address of the PC in the [Start IP] field.
c.
IP Address Range [Address Range] – choose this option to block a range of LAN
clients.
Enter the starting LAN IP address in the [Start IP] field and the ending
LAN IP address of the range you want in the [End IP] field.
5.
When your configuration is complete, click the [Apply] button to save your changes and
return to the main Access Control page.
Customer Defined Filtering Access Rule (Custom):
1.
On the Side Navigation bar, click on [Firewall] then select [Access Control]
2.
Under the Customer Defined Section, click on the [Add] button
3.
On the Customer Defined Filter page, define a Name for the service/application that
you want to block.
NOTE
: The Name is only for reference purposes.
4.
Then select the protocol type from the pull-down menu that they would like to block.
The options are
TCP | UDP | TCP/UDP.
5.
Select the [LAN IPs] that you want this access rule to apply to. You can choose to apply
this rule to Any IP Address, a Single IP Address, or a Range of IP Addresses.
a.
Any IP Address [Any] – choose this option to block all LAN clients.
You don’t
need to configure the [Start IP] or [End IP] options.
b.
Single IP Address [Single address] – choose this option to block a single LAN
client.
Enter the LAN IP address of the PC in the [Start IP] field.
c.
IP Address Range [Address Range] – choose this option to block a range of LAN
clients.
Enter the starting LAN IP address in the [Start IP] field and the ending
LAN IP address of the range you want in the [End IP] field.
6.
To complete the configuration enter in the [From Port] and [To Port] information will
be blocked on the network.
NOTE
: Usually every application has its own corresponding port number. Users should
find out the correct port number from the application vendor. For example, if you are
trying to block access to a Peer-2-Peer file sharing application then you should visit
that applications web site to see the ports that application uses.
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 60
7.
When your configuration is complete, click the [Apply] button to save your changes and
return to the main Access Control page.
Special Application
Some applications, such as Internet gaming, videoconferencing, Internet telephony, and others
require multiple connections.
Rules are based on the port or range of ports that the
application sends data to the server on (destination port).
When the Gateway sees traffic sent
to the configured port(s), it dynamically allows all incoming traffic from the server on any port
for the specified time.
To access the Special Application configuration page, on the Side Navigation bar, click on
[Firewall] link and then click on the [Special Application] link.
To enable this option, click the [Enable Triggering] checkbox.
To configure a Special Application Rule, follow the steps outlined below:
1.
On the Side Navigation bar, click on [Firewall] then select [Special Application]
2.
Click on the [Add] button on the Special Application page to access the [Trigger]
configuration section.
3.
Enter in the [Name] that you want to use for this rule.
4.
In the [Type] pull-down menu, select the data/traffic type that this rule will apply to.
The options are
TCP | UDP.
5.
Configure the [Port Number] that your application will be using as the outgoing trigger
ports.
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 60
6.
Set the [Interval] of the rule. This is the time in between the outgoing and incoming
data traffic.
NOTE
:
If you set this value too low, the incoming ports will be closed before the return
data arrives at the firewall and the connection will be broken and the application will not
work.
7.
The last 2 options are for Advanced Users, most users can leave this at the default
settings:
IR Replacement – Default Setting: Disable address replacement
Allow sessions initiated from/to the 3
rd
host – Default Setting: unchecked
8.
When your configuration is complete, click the [Apply] button to save your changes and
return to the main Special Application page.
URL Blocking
This section allows you to control the content network. This feature is good for both business
and parents looking to control the content accessible from a web browser.
To access the URL Blocking configuration page, on the Side Navigation bar, click on [Firewall]
link and then click on the [URL Blocking] link.
To enable this option, click the [Enable Keyword Blocking] checkbox
To configure URL blocking, follow the steps outlined below:
1.
On the Side Navigation bar, click on [Firewall] then select [URL Blocking]
2.
Check the [Enable Keyword Blocking] checkbox to turn URL blocking on.
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 60
3.
Enter in a new keyword or URL address that you want to block in the [Keyword/Domain
Name] input box.
4.
Press the [Add Keyword] button to save this keyword or URL.
5.
The new keyword or URL address would be listed in the text box below.
NOTE
: This list will support 50 Keywords or URLs.
If you want a PC on your network to bypass these rules you will need to set that PC as an
Exempted PC/Trusted Host.
To configure this option, check the [Add Trusted Host] option and
enter the LAN IP address of the PC that you want to bypass the URL/Keyword blocking function
with.
Schedule Rule
This feature will block Internet content based on the URL blocking function for PCs on your
network based on the day and or time.
NOTE
: The URL/Keyword blocking feature must be configured to use this schedule rule.
To access the Schedule Rule configuration page, on the Side Navigation bar, click on [Firewall]
link and then click on the [Schedule Rule] link.
To enable this option, click the [Enable Schedule Function] checkbox.
To configure Schedule Rules, follow the steps outlined below:
1.
On the Side Navigation bar, click on [Firewall] then select [Schedule Rule]
2.
In the [Week Day] table check the Days that you want to apply URL/Keyword Blocking.
3.
Define the appropriate settings for a schedule rule.
4.
Click the [OK] button to approve rule.
5.
Then click the [APPLY] button to save your settings.
Email/Syslog Alert
The Gateway can provide network log and alert information to keep you updated.
The
Gateway can send an e-mail to as many as 4 users alerting them of an attempted intrusion or
hacker attack. The Gateway also supports a Syslog Client so you can export your Network Log
entries to a Syslog Server.
To access the Email/Syslog Alert configuration page, on the Side Navigation bar, click on
[Firewall] link and then click on the [Email/Syslog Alert] link.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top