Enter the keywords or URLs that you want to allow or block.
Website Filters are used to allow you to set up a list of Web sites that can be viewed by multiple users through the network. To use this feature select
the appropriate Web Filtering option, enter the domain or website, and click
Save Settings
.
Click the
Save Settings
button to save any changes made.
Page 78 / 171
73
D-Link DHP-1565 User Manual
Section 3 - Configuration
Inbound Filter
Enter a name for the inbound filter rule.
Select
Allow
or
Deny
.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if you
do not want to specify an IP range.
Enter the ending IP address. Enter 255.255.255.255
if you do not want to specify and IP range.
Click the
Add
button to apply your settings.
Name:
Action:
Enable:
Remote IP
Start:
Remote IP End:
Add:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound
data filtering rules that control data based on an IP address range.
Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote
Administration features.
Page 79 / 171
74
D-Link DHP-1565 User Manual
Section 3 - Configuration
Check the
Enable SPI
box to enable the SPI (Stateful
Packet Inspection, also known as dynamic packet filtering)
feature. Enabling SPI helps to prevent cyber attacks by
tracking more state per session. It validates that the traffic
passing through the session conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent
- Any incoming traffic sent to
an open port will be forwarded to the application that
opened the port. The port will close if idle for 5 minutes.
Address Restricted
- Incoming traffic must match the IP
address of the outgoing connection.
Address + Port Restriction
- Incoming traffic must match
the IP address and port of the outgoing connection.
Enable this option to provide protection from certain kinds
of “spoofing” attacks.
Firewall
Settings:
NAT Endpoint
Filtering:
Enable
Anti-Spoof
Checking:
Firewall Settings
A firewall protects your network from the outside world. The DHP-1565 offers a firewall type functionality. The SPI feature helps prevent cyber
attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer,
you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
Page 80 / 171
75
D-Link DHP-1565 User Manual
Section 3 - Configuration
1. Check the
Enable DMZ
box.
2. Specify the IP address of the computer on the
LAN that you want to have unrestricted Internet
communication in the DMZ IP address field. To
specify an existing DHCP client, use the
Computer
Name
drop-down
to select the
computer that
you want to make a DMZ host. If selecting a
computer that is a DHCP client, be sure to make
a static reservation in the
Setup > Network
Settings
page so that the IP address of the DMZ
machine does not change.
3. Click the
Save Settings
button to add the new
DMZ host.
DMZ Host:
IP Address:
If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application
on that computer.
Carry out the following to create a DMZ host:
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer
obtains its IP address automatically using DHCP, be sure to make a static reservation on the
System > Network Settings
page so
that the IP address of the DMZ machine does not change.
Note:
Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as