Page 86 / 103 Scroll up to view Page 81 - 85
DG-BG4300N User Manual
8.2.2 IPv6/ Port Filtering
IPv6 configuration is mostly the same as IPv4 configuration (please refer to 8.2.1IP/Port Filtering). IPv4
uses only 32 bits for IP address space. IPv6 allows 128 bits for IP address space.
Page 87 / 103
DG-BG4300N User Manual
8.3 URL Filter
The URL Blocking is the web filtering solution. The firewall has the ability to block access to specific web
URLs based on string matches. This can allow large numbers of URLs to be blocked by specifying only a
FQDN (such as tw.yahoo.com). The URL Blocking enforces a Web usage policy to control content
downloaded from, and uploaded to the Web.
8.3.1 URL Blocking Configuration
Fields in this page:
Field
Description
URL Blocking capability
Check this item to enable the URL Blocking feature.
Keyword
The filtered keyword such as yahoo. If the URL includes this keyword,
the yahoo URL’s will be blocked to
access.
Page 88 / 103
DG-BG4300N User Manual
8.4 ACL Setup
The Access Control List (ACL) is a list of permissions for a packet to be matched. The list specifies who
is allowed to access this device. If ACL is enabled, all hosts cannot access this device except for the
hosts with IP address in the ACL table.
8.4.1 ACL Configuration
1.
LAN
You can enable LAN ACS Switch to allow/block the PC to access the Modem.
2.
WAN
You can enable web(http)/telenet/ftp/tftp/snmp/ping for WAN access.
Page 89 / 103
DG-BG4300N User Manual
8.4.2 IPv6 ACL Configuration
IPv6 configuration is mostly the same as IPv4 configuration (please refer to 7.4.1
ACL Configuration).
IPv4 uses only 32 bits for IP address space; IPv6 allows 128 bits for IP address space.
Page 90 / 103
DG-BG4300N User Manual
8.5 DoS Setting
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its
intended users. One common method of attack involves saturating the target machine with external
communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be
rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS
attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources
so that it can no longer provide its intended service or obstructing the communication media between the
intended users and the victim so that they can no longer communicate adequately.
Enable DoS Prevention to detect and prevent denial of service attacks through automatic rate filtering or
rules to protect legitimate users during the DoS attacks.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top