Page 81 / 134
Scroll up to view Page 76 - 80
DG-BG4100N User
Manual
81
3.5.2.4 URL Filter
Click
URL Filter
in the left pane, and the page shown in the following figure appears. This
page is used to block a fully qualified domain name, such as tw.yahoo.com and filtered
keyword. You can add or delete the filtered keyword.
The following table describes the parameters and buttons of this page:
Field
Description
URL/KEYWORD
Blocking
Capability
You can choose Disable or Enable.
Select Disable to disable URL/KEYWORD blocking
function and keyword filtering function.
Select Enable to block access to the URLs and keywords
specified in the URL/KEYWORD Blocking Table.
URL/Keyword
Enter the URL/keyword to block.
Add
Click it to add a URL/keyword to the URL/KEYWORD Blocking
Table.
Delete
Select a row in the URL/KEYWORD Blocking Table and click
Delete to delete the row.
URL/KEYWORD
Blocking Table
A list of URL (s) to which access is blocked will be displayed in
this table.
Page 82 / 134
DG-BG4100N User
Manual
82
3.5.2.5 Anti-DoS
Denial-of-Service Attack (DoS attack) is a type of attack on a network that is designed to
bring the network to its knees by flooding it with useless traffic.
A denial-of-service attack (DoS attack) is an attempt to make a computer resource
unavailable to its intended users. One common method of attack involves saturating the
target machine with external communications requests, such that it cannot respond to
legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such
attacks usually lead to a server overload.
In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to
reset, or consuming its resources so that it can no longer provide its intended service or
obstructing the communication media between the intended users and the victim so that they
can no longer communicate adequately.
Enable DoS Preventionto detect and prevent denial of service attacks through automatic rate
filtering or rules toprotect legitimate users during the DoS attacks.
Page 83 / 134
DG-BG4100N User
Manual
83
Click
Anti-DoS
in the left pane, and the page shown in the following figure appears. In this
page, you can prevent DoS attacks.
Page 84 / 134
DG-BG4100N User
Manual
84
3.5.2.6 Software Forbidden
Click
Software Forbidden
in the left pane, the page shown in the following figure appears.
This interface realizes application control. Select an application from the drop-down list to
prohibit the application from accessing network resources.
The following table describes the parameters and buttons of this page:
Field
Description
Current Forbidden
Software List
A list of currently forbidden applications for accessing the
network.
Add Forbidden
Software
Select an application to be forbidden from accessing the
network.
Page 85 / 134
DG-BG4100N User
Manual
85
3.5.3
UPnP
Choose
Service > UPnP
, and the page shown in the following figure appears. This page is
used to configure UPnP. The system acts as a daemon after you enable it.
3.5.4
IGMP Proxy
Choose
Service > IGMP Proxy
, and the page shown in the following figure appears. IGMP
proxy enables the system to issue IGMP host messages on behalf of hosts that the system
discovered through standard IGMP interfaces. The system acts as a proxy for its hosts after
you enable it.