Page 61 / 106 Scroll up to view Page 56 - 60
59
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times. Restriction can be set for a
single computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer, for example, enter the IP
address of the computer you wish to restrict access to in the IP fields
(1)
.
Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
. Select “Block”
(4)
. You can also select “Always” to block access all of the time. Select the
day to start on top
(5)
, the time to start on top
(6)
, the day to end on the
bottom
(7)
, and the time to stop
(8)
on the bottom. Select “Enable”
(9)
. Click
“Apply Changes”. The computer at the IP address you specified will now be
blocked from Internet access at the times you specified.
Note:
Be sure you
have selected the correct time zone under “Utilities> System Settings>
Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Page 62 / 106
Using the Web-Based Advanced User Interface
60
Setting MAC Address Filtering
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the network. Any computer
attempting to access the network that is not specified in the filter list will be
denied access. When you enable this feature, you must enter the MAC address
of each client (computer) on your network to allow network access to each.
(1)
(2)
(3)
Not shown, scroll down
to the bottom of the
page to click “Apply
Changes”.
To enable this feature, select “MAC Address Filtering” and click “Enable”
(1)
.
Next, enter the MAC address of each computer on your network by clicking
in the space provided
(2)
and entering the MAC address of the computer
you want to add to the list. Click “Add”
(3)
, then “Apply Changes” to save the
settings. You can have a MAC-address-filtering list of up to 32 computers.
Note:
You will not be able to delete the MAC address of the computer you
are using to access the Router’s administrative functions (the computer you
are using now).
Page 63 / 106
61
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network to
be placed outside of the firewall. This may be necessary if the firewall is
causing problems with an application such as a game or video conferencing
application. Use this feature on a temporary basis. The computer in the DMZ
is NOT protected from hacker attacks.
Note:
If your ISP subscription provides you with additional public (WAN) IP
addresses, additional computers can be placed outside the firewall provided
each computer uses a different public (WAN) IP.
To put a computer in the DMZ, enter the last digits of its IP address in the IP
field and select “Enable”. Click “Apply Changes” for the change to take effect.
Page 64 / 106
Using the Web-Based Advanced User Interface
62
WAN Ping Blocking
Computer hackers use what is known as “pinging” to find potential victims on
the Internet. By pinging a specific IP address and receiving a response from
the IP address, a hacker can determine that something of interest might be
there. The Router can be set up so it will not respond to an ICMP ping from
the outside. This heightens the level of security of your Router.
(1)
To turn off the ping response, select “Block ICMP Ping”
(1)
and click “Apply
Changes”. The Router will not respond to an ICMP ping.
Page 65 / 106
63
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
Utilities Tab
This screen lets you manage different parameters of the Router and perform
certain administrative functions.

Rate

3.5 / 5 based on 2 votes.

Popular Ativa Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top