Page 136 / 275 Scroll up to view Page 131 - 135
Vigor2110 Series User’s Guide
129
Profile Name
Type a name for this profile.
Type a name for such profile and check all the items of file extension that will be processed in
the router. Finally, click
OK
to save this profile.
Page 137 / 275
Vigor2110 Series User’s Guide
130
4.6.8 IM Object
This page allows you to set 32 profiles for Instant Messenger. These profiles will be applied in
CSM>>IM/P2P Filter Profile
for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. There are several types of
Instant Messenger (IM) provided here for you to choose to disallow people using. Simple
check the box (es) and then click
OK
. Later, in the
CSM>>IM/P2P Filter Profile
page, you
can use
IM Object
drop down list to choose the proper profile configured here as the standard
for the host(s) to follow.
Profile Name
Type a name for this profile.
Type a name for such profile and check all the items that not allowed to be used in the host.
Finally, click
OK
to save this profile.
Page 138 / 275
Vigor2110 Series User’s Guide
131
4.6.9 P2P Object
This page allows you to set 32 profiles for peer-to-peer application. These profiles will be
applied in
CSM>>IM/P2P Filter Profile
for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. There are several items for
P2P protocols provided here for you to choose to disallow people using. Simple check the box
(es) and then click
OK
. Later, in the
CSM>>IM/P2P Filter Profile
page, you can use
P2P
Object
drop down list to choose the proper profile configured here as the standard for the
host(s) to follow.
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the host.
Finally, click
OK
to save this profile.
Page 139 / 275
Vigor2110 Series User’s Guide
132
4.6.10 Misc Object
This page allows you to set 32 profiles for miscellaneous applications. These profiles will be
applied in
CSM>>IM/P2P Filter Profile
for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. Applications for tunneling
and streaming are listed in the page for you to choose to disallow people using. Simple check
the box (es) and then click
OK
. Later, in the
CSM>>IM/P2P Filter Profile
page, you can use
Misc Object
drop down list to choose the proper profile configured here as the standard for
the host(s) to follow.
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the host.
Finally, click
OK
to save this profile.
Page 140 / 275
Vigor2110 Series User’s Guide
133
4.7 CSM Profile
Content Security Management (CSM)
CSM
is an abbreviation of
Content Security Management
which is used to control IM/P2P
usage, filter the web content and URL content to reach a goal of security management.
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar situation
for corporation towards peer-to-peer applications since file-sharing can be convenient but
insecure at the same time. To address these needs, we provide CSM functionality.
IM/P2P Filter
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar situation
for corporation towards peer-to-peer applications since file-sharing can be convenient but
insecure at the same time. To address these needs, we provide CSM functionality.
URL Content Filter
To provide an appropriate cyberspace to users, Vigor router equips with
URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user’s access to the
website. You may imagine
URL Content Filter
as a well-trained convenience-store clerk who
won’t sell adult magazines to teenagers. At office,
URL Content Filter
can also provide a
job-related only environment hence to increase the employee work efficiency. How can URL
Content Filter work better than traditional firewall in the field of filtering? Because it checks
the URL strings or some of HTTP data hiding in the payload of TCP packets while legacy
firewall inspects packets based on the fields of TCP/IP headers only.
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It’s very common that malicious codes conceal in the executable objects,
such as ActiveX, Java Applet, compressed files, and other executable files. Once downloading
these types of files from websites, you may risk bringing threat to your system. For example, an
ActiveX control object is usually used for providing interactive web feature. If malicious code
hides inside, it may occupy user’s system.
Web Content Filter
We all know that the content on the Internet just like other types of media may be
inappropriate sometimes. As a responsible parent or employer, you should protect those in your
trust against the hazards. With Web filtering service of the Vigor router, you can protect your
business from common primary threats, such as productivity, legal liability, network and
security threats. For parents, you can protect your children from viewing adult websites or chat
rooms.
Once you have activated your Web Filtering service in Vigor router and chosen the categories of
website you wish to restrict, each URL address requested (e.g.www.bbc.co.uk) will be checked
against our server database. This database is updated as frequent as daily by a global team of
Internet researchers. The server will look up the URL and return a category to your router. Your

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top