Page 66 / 134 Scroll up to view Page 61 - 65
62
D-Link DIR-655 User Manual
Section 3 - Configuration
Enter a name for the policy and then click
Next
to continue.
Select a schedule (I.E. Always) from the drop-down menu and
then click
Next
to continue.
Enter the following information and then click
Next
to continue.
Address Type
- Select IP address, MAC address, or Other
Machines.
IP Address
- Enter the IP address of the computer you want
to apply the rule to.
Page 67 / 134
63
D-Link DIR-655 User Manual
Section 3 - Configuration
Select the filtering method and then click
Next
to continue.
Enter the rule:
Enable
- Check to enable the rule.
Name
- Enter a name for your rule.
Dest IP Start
- Enter the starting IP address.
Dest IP End
- Enter the ending IP address.
Protocol
- Select the protocol.
Dest Port Start
- Enter the starting port number.
Dest Port End
- Enter the ending port number.
To enable web logging, click
Enable
.
Click
Save
to save the access control rule.
Page 68 / 134
64
D-Link DIR-655 User Manual
Section 3 - Configuration
Enter the keywords or URLs that you want to block
(or allow). Any URL with the keyword in it will be
blocked.
Website URL/
Domain:
Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a specially formatted text string
that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not
display. To use this feature, enter the text string to be blocked and click
Save Settings
. The text to be blocked will appear in the list. To delete the
text, click
Clear the List Below
.
Website Filters
Page 69 / 134
65
D-Link DIR-655 User Manual
Section 3 - Configuration
Enter a name for the inbound filter rule.
Select
Allow
or
Deny
.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if you
do not want to specify an IP range.
Enter the ending IP address. Enter 255.255.255.255
if you do not want to specify and IP range.
Click the
Save
button to apply your settings. You
must click
Save Settings
at the top to save the
settings.
This section will list any rules that are created. You
may click the
Edit
icon to change the settings or
enable/disable the rule, or click the
Delete
icon
to remove the rule.
Name:
Action:
Enable:
Source IP Start:
Source IP End:
Save:
Inbound Filter
Rules List:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound
data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote
Administration features.
Inbound Filters
Page 70 / 134
66
D-Link DIR-655 User Manual
Section 3 - Configuration
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent
- Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port
will close if idle for 5 minutes.
Address Restricted
- Incoming traffic must match the IP address of
the outgoing connection.
Address + Port Restriction
- Incoming traffic must match the IP
address and port of the outgoing connection.
If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application
on that computer.
Note:
Placing a computer in the DMZ may expose that computer to a
variety of security risks. Use of this option is only recommended as a
last resort.
Specify the IP address of the computer on the LAN that you want to
have unrestricted Internet communication. If this computer obtains
it’s IP address automatically using DHCP, be sure to make a static
reservation on the
Basic
>
DHCP
page so that the IP address of the DMZ machine does not change.
Enable SPI:
NAT Endpoint
Filtering:
Enable DMZ Host:
IP Address:
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-655 offers a firewall type functionality. The SPI feature helps prevent cyber
attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer,
you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top