Page 81 / 139 Scroll up to view Page 76 - 80
77
D-Link DIR-803 User Manual
Section 3 - Configuration
Enter the rule:
Enable
- Check to enable the rule.
Name
- Enter a name for your rule.
Dest.IP.Start
- Enter the starting IP address.
Dest.IP.End
- Enter the ending IP address.
Protocol
- Select the protocol.
Dest.Port.Start
- Enter the starting port number.
Dest.Port.End
- Enter the ending port number.
To enable web logging, click
Enable
.
Click
Save
to save the access control rule.
Your newly created policy will now show up under
Policy.Table
.
Page 82 / 139
78
D-Link DIR-803 User Manual
Section 3 - Configuration
Add Website
Filtering Rule:
Website URL/
Domain:
Website Filters
Select either
DENY.computers.access.to.ONLY.
these.sites
or
ALLOW.computers.access.to.ONLY.
these.sites
.
Enter the keywords or URLs that you want to allow
or block. Click
Save.Settings
.
Website Filters are used to allow you to set up a list of Web sites that can be viewed by multiple users through the network.
To use this feature select to
Allow
or
Deny
, enter the domain or website and click
Save.Settings
. You must also select
Apply.
Web.Filter
under the
Access Control
section.
Page 83 / 139
79
D-Link DIR-803 User Manual
Section 3 - Configuration
Enter a name for the inbound filter rule.
Select
Allow
or
Deny
.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if you
do not want to specify an IP range.
Enter the ending IP address. Enter 255.255.255.255
if you do not want to specify and IP range.
Click the
Add
button to apply your settings. You
must click
Save.Settings
at the top to save the
settings.
This section will list any rules that are created. You
may click the
Edit
icon to change the settings or
enable/disable the rule, or click the
Delete
icon
to remove the rule.
Name:
Action:
Enable:
Remote IP Start:
Remote IP End:
Add:
Inbound Filter
Rules List:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can
configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual
Server, Port Forwarding, or Remote Administration features.
Inbound Filters
Page 84 / 139
80
D-Link DIR-803 User Manual
Section 3 - Configuration
SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It
validates that the traffic passing through the session conforms to the
protocol.
Enable this feature to protect your network from certain kinds of
“spoofing” attacks.
Enable SPI:
Anti-Spoof Check:
Firewall Settings
A firewall protects your network from the outside world. The DIR-803 offers a firewall type functionality. The SPI feature helps
prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications.
If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the
chosen computer completely to the outside world.
Page 85 / 139
81
D-Link DIR-803 User Manual
Section 3 - Configuration
DMZ IP Address:
PPTP:
IPSEC (VPN):
RTSP:
SIP:
Specify the IP address of the computer on the LAN that you want to
have unrestricted Internet communication. If this computer obtains
it’s IP address automatically using DHCP, be sure to make a static
reservation on the
Setup
>
Network.Settings
page so that the IP
address of the DMZ machine does not change.
Allows multiple machines on the LAN to connect to their corporate
network using PPTP protocol.
Allows multiple VPN clients to connect to their corporate network
using IPSec. Some VPN clients support traversal of IPSec through
NAT. This ALG may interfere with the operation of such VPN clients.
If you are having trouble connecting with your corporate network,
try turning this ALG off. Please check with the system administrator
of your corporate network whether your VPN client supports
NAT traversal.
Allows application that uses Real Time Streaming Protocol to receive
streaming media from the Internet. QuickTime and Real Player are
some of the common applications using this protocol.
Allows devices and applications using VoIP (Voice over IP) to
communicate across NAT. Some VoIP applications and devices have
the ability to discover NAT devices and work around them. This ALG
may interfere with the operation of such devices. If you are having
trouble making VoIP calls, try turning this ALG off.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top