Page 91 / 172 Scroll up to view Page 86 - 90
Firewall
89
To edit or delete specific existing filtering rules, click on
Edit
or
Delete
for
the appropriate filtering rule.
Figure 70
PC Privileges Add PC Screen
1
Enter a description in the
Client PC Description
field, and the IP address or
IP address range into the
Client PC IP Address
fields.
2
To bypass the URL Filter, check the corresponding
Bypass
checkbox. If you
check this option, then the Web sites and keywords defined in this screen
will not be filtered out.
3
Select the services to be blocked. A list of popular services is listed on this
screen, to block a particular service, check the appropriate
Blocking
checkbox.
If the service to be restricted is not listed here, you can enter a custom
range of ports at the bottom of the screen, under
User Defined Blocked
Ports.
4
If you want the restriction to apply only at certain times, select the
schedule rule to apply from the
Schedule Rule
drop-down menu.
Note that schedule rules are defined on the Schedule Rules screen
(see
page 90
).
5
Click
Apply
to add the settings.
Downloaded from
www.Manualslib.com
manuals search engine
Page 92 / 172
90
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
Schedule Rule
The Router can be configured to restrict access to the Internet, email or
other network services at specific days and times. Define the time in this
screen, and define the rules in the
PC Privileges
screen (see
page 88
).
Figure 71
Schedule Rule Screen
1
Click
Add Rule
to add a schedule rule
(refer to
Figure 72
).
Figure 72
Add Schedule Rule Screen
2
Enter a name and comment for the schedule rule in the
Name
and
Comment
fields.
3
Specify the schedule rules for the required days and times - note that all
times should be in 24 hour format.
4
Click
Apply
.
Downloaded from
www.Manualslib.com
manuals search engine
Page 93 / 172
Firewall
91
URL Filter
To configure the URL filter feature, use the table on the URL Filter screen
to specify the Web sites (www.somesite.com) and/or keywords you want
to filter on your network.
For example, entering a keyword of
xxx
would block access to any URL
that contains the string
xxx
.
Figure 73
URL Filter Screen
1
Check the
Enable URL Filtering Function
checkbox. The rule table will
appear.
2
Enter the URL address or keywords in the
URL/Keyword
field.
3
Select
Denied or Allowed
from the
Mode
drop-down menu.
To complete this configuration, you will need to create or modify the
filtering rule in the PC Privileges screen (see
page 88
).
From the
PC Privileges Add PC
screen (
Figure 70
), if you check the option:
Bypass URL Filter
, then the Web sites and keywords defined in this screen
will not be filtered out.
Downloaded from
www.Manualslib.com
manuals search engine
Page 94 / 172
92
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
Advanced
The Advanced section allows you to set additional parameter details for
the Router. You can configure:
Security
VLAN
Static Routes
RIP
DDNS
SNMP
Syslog
Proxy Arp
QoS Settings
Security
Use the Security screen to set the advanced security settings for the
Router.
Figure 74
Security Screen
Downloaded from
www.Manualslib.com
manuals search engine
Page 95 / 172
Advanced
93
NAT
— (Network Address Translation), NAT is the method by which
the Router shares the single IP address assigned by your ISP with the
computers on your network.
This function should only be disabled by advanced users, and if your
ISP assigns you multiple IP addresses or you need NAT disabled for an
advanced system configuration. If you have a single IP address and
you turn NAT off, the computers on your network will not be able to
access the Internet. Other problems may also occur.
IPSec NAT-T Pass-through — NAT-T (NAT Traversal) is an Internet Draft
proposed to IETF in order to help the problems associated with passing
IPSec traffic through NAT Routers. For NAT-T to work, both ends of the
connection need to support this function. Ensure that you select NAT-T
only if it is needed as it will reduce LAN-WAN throughput. This Router
supports NAT-T draft 2 implementation.
Universal Plug and Play — This is a technology that offers seamless
operation of voice messaging, video messaging, games, and other
applications that are Universal Plug and Play compliant. Some
applications require the Router's firewall to be configured in a specific
way to operate properly. This usually requires opening TCP and UDP
ports and in some instances setting trigger ports. An application that
is Universal Plug and Play compliant has the ability to communicate
with the Router, basically "telling" the Router which way it needs the
firewall configured. The Router ships with the Universal Plug and Play
feature disabled. If you are using any applications that are Universal
Plug and Play compliant, and want to take advantage of the Universal
Plug and Play features, you can enable this feature. Simply check the
Enable Universal Plug and Play
checkbox. Click
Apply
to save the
change.
WAN Ping Blocking — Computer hackers use what is known as
"Pinging" to find potential victims on the Internet. By pinging a
specific IP address and receiving a response from the IP address, a
hacker can determine that something of interest might be there.
The Router can be set up so it will not respond to an Internet Control
Message Protocol (ICMP) Ping from the outside. This heightens the
level of security of your Router. To turn off the ping response, check
Block ICMP Ping
and click
Apply;
the Router will not respond to an
ICMP ping from the Internet.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top