Page 76 / 146 Scroll up to view Page 71 - 75
Chapter 4: Configuration
72
URL Filtering
URL (Uniform Resource Locator – e.g. an address in the form of
or
) filter rules allow you to prevent users on your network from accessing
particular websites by their URL. There are no pre-defined URL filter rules; you can add filter rules
to meet your requirements.
Enable/Disable:
To enable or disable URL Filter feature.
Block Mode:
A list of the modes that you can choose to check the URL filter rules. The default is
set to
Disabled.
~
Disabled:
No action will be performed by the Block Mode.
~
Always On:
Action is enabled.
URL filter rules will be monitoring and checking at all hours
of the day.
~
TimeSlot1 ~ TimeSlot16:
It is self-defined time period.
You may specify the time period to
check the URL filter rules, i.e. during working hours. For setup and detail, refer to
Time
Schedule
section.
Keywords Filtering:
Allows blocking by specific keywords within a particular URL rather than
having to specify a complete URL (e.g. to block any image called “advertisement.gif”). When
enabled, your specified keywords list will be checked to see if any keywords are present in URLs
accessed to determine if the connection attempt should be blocked. Please note that the URL filter
blocks web browser (HTTP) connection attempts using port 80 only.
Page 77 / 146
Chapter 4: Configuration
73
For example, if the URL is
, it will be dropped as the keyword
“abcde” occurs in the URL.
Domains Filtering: This function checks the domain name only, not the IP address, in URLs
accessed against your list of domains to block or allow. If it is matched, the URL request will
be sent (Trusted) or dropped (Forbidden). For this function to be activated,
both check-boxes
must be checked
. The checking procedure is:
1.
Check the domain in the URL to determine if it is in the trusted list. If yes, the
connection attempt is sent to the remote web server.
2.
If not, check if it is listed in the forbidden list, and if present then the connection attempt
is dropped.
3.
If the packet does not match either of the above two items, it is sent to the remote web
server.
4.
Please be note that the domain only should be specified, not the full URL. For example
to block traffic to
www.sex.com
, enter “sex” or “sex.com” instead of “www.sex.com”. In
the example below, the URL request for
www.abc.com
will be sent to the remote web
server because it is listed in the trusted list, whilst the URL request for
www.sex
or
www.sex.com
will be dropped, because sex.com is in the forbidden list.
Restrict URL Features:
This function enhances the restriction to your URL rules.
Page 78 / 146
Chapter 4: Configuration
74
Example:
Andy wishes to disable all WEB traffic except for ones listed in the trusted domain,
which would prevent Bobby from accessing other web sites.
Andy selects both functions in the
Domain Filtering
and thinks that it will stop Bobby.
But Bobby
knows this function,
Domain Filtering
, ONLY disables all WEB traffic except for
Trusted Domain,
BUT not its
IP address.
If this is the situation,
Block surfing by IP address
function can be
handy and helpful to Andy.
Now, Andy can prevent Bobby from accessing other sites.
~
Block Java Applet:
This function can block Web content that includes the Java Applet. It is
to prevent someone who wants to damage your system via standard HTTP protocol.
~
Block surfing by IP address:
Preventing someone who uses the IP address as URL for
skipping
Domains Filtering
function.
Activates only and if
Domain Filtering
enabled.
Page 79 / 146
Chapter 4: Configuration
75
Firewall Log
Firewall Log display log information of any unexpected action with your firewall settings.
Check the
Enable
box to activate the logs.
Log information can be seen in the
Status – Event Log
after enabling.
Page 80 / 146
Chapter 4: Configuration
76
VPN (Virtual Private Networks) (VPN Router Only)
Virtual Private Networks is ways to establish secured communication tunnels to an organization’s
network via the Internet. Your router supports three main types of VPN (Virtual Private Network),
PPTP
,
IPSec
and
L2TP.
PPTP (Point-to-Point Tunneling Protocol)
There are two types of PPTP VPN supported;
Remote Access
and
LAN-to-LAN
(please refer
below for more information.). Click
Create
to configure a new VPN connection.
After you have created PPTP connection, account status will be displayed. (See example above).
~
Enable / Disable:
This function activates or deactivates the PPTP connection.
To wish
interrupting the tunnel, check
Disable
radio button and click
Apply
button to deactivate the
connection.
Name:
This is the user-defined name of the connection.
Type:
This refers to your router operates as a client or a server,
Dialout
or
Dialin
in respectively.
Status:
It informs your PPTP tunnel connection condition.

Rate

3.5 / 5 based on 2 votes.

Popular BEC Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top