Page 131 / 251 Scroll up to view Page 126 - 130
Vigor2920 Series User’s Guide
121
Type a name for such profile and check all the items that not allowed to be used in the host.
Finally, click
OK
to save this profile.
4.5.9 P2P Object
This page allows you to set 32 profiles for peer-to-peer application. These profiles will be
applied in
CSM>>IM/P2P Filter Profile
for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. There are several items for
P2P protocols provided here for you to choose to disallow people using. Simple check the box
(es) and then click
OK
. Later, in the
CSM>>IM/P2P Filter Profile
page, you can use
P2P
Object
drop down list to choose the proper profile configured here as the standard for the
host(s) to follow.
VoIPon
www.voipon.co.uk
Tel: +44 (0)1245 808195
Fax: +44 (0)1245 808299
Page 132 / 251
Vigor2920 Series User’s Guide
122
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the host.
Finally, click
OK
to save this profile.
4.5.10 Misc Object
This page allows you to set 32 profiles for miscellaneous applications. These profiles will be
applied in
CSM>>IM/P2P Filter Profile
for filtering.
Set to Factory Default
Clear all profiles.
VoIPon
www.voipon.co.uk
Tel: +44 (0)1245 808195
Fax: +44 (0)1245 808299
Page 133 / 251
Vigor2920 Series User’s Guide
123
Click the number under Profile column for configuration in details. Applications for tunneling
and streaming are listed in the page for you to choose to disallow people using. Simple check
the box (es) and then click
OK
. Later, in the
CSM>>IM/P2P Filter Profile
page, you can use
Misc Object
drop down list to choose the proper profile configured here as the standard for
the host(s) to follow.
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the host.
Finally, click
OK
to save this profile.
VoIPon
www.voipon.co.uk
Tel: +44 (0)1245 808195
Fax: +44 (0)1245 808299
Page 134 / 251
Vigor2920 Series User’s Guide
124
4.6 CSM Profile
Content Security Management (CSM)
CSM
is an abbreviation of
Content Security Management
which is used to control IM/P2P
usage, filter the web content and URL content to reach a goal of security management.
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar situation
for corporation towards peer-to-peer applications since file-sharing can be convenient but
insecure at the same time. To address these needs, we provide CSM functionality.
IM/P2P Filter
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar situation
for corporation towards peer-to-peer applications since file-sharing can be convenient but
insecure at the same time. To address these needs, we provide CSM functionality.
URL Content Filter
To provide an appropriate cyberspace to users, Vigor router equips with
URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user’s access to the
website. You may imagine
URL Content Filter
as a well-trained convenience-store clerk who
won’t sell adult magazines to teenagers. At office,
URL Content Filter
can also provide a
job-related only environment hence to increase the employee work efficiency. How can URL
Content Filter work better than traditional firewall in the field of filtering? Because it checks
the URL strings or some of HTTP data hiding in the payload of TCP packets while legacy
firewall inspects packets based on the fields of TCP/IP headers only.
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It’s very common that malicious codes conceal in the executable objects,
such as ActiveX, Java Applet, compressed files, and other executable files. Once downloading
these types of files from websites, you may risk bringing threat to your system. For example, an
ActiveX control object is usually used for providing interactive web feature. If malicious code
hides inside, it may occupy user’s system.
Web Content Filter
We all know that the content on the Internet just like other types of media may be
inappropriate sometimes. As a responsible parent or employer, you should protect those in your
trust against the hazards. With Web filtering service of the Vigor router, you can protect your
business from common primary threats, such as productivity, legal liability, network and
security threats. For parents, you can protect your children from viewing adult websites or chat
rooms.
Once you have activated your Web Filtering service in Vigor router and chosen the categories of
website you wish to restrict, each URL address requested (e.g.www.bbc.co.uk) will be checked
against our server database. This database is updated as frequent as daily by a global team of
Internet researchers. The server will look up the URL and return a category to your router. Your
VoIPon
www.voipon.co.uk
Tel: +44 (0)1245 808195
Fax: +44 (0)1245 808299
Page 135 / 251
Vigor2920 Series User’s Guide
125
Vigor router will then decide whether to allow access to this site according to the categories you
have selected. Please note that this action will not introduce any delay in your Web surfing
because each of multiple load balanced database servers can handle millions of requests for
categorization.
Note:
The priority of URL Content Filter is higher than Web Content Filter.
4.6.1 IM/P2P Filter Profile
You can define policy profiles for different policy of IM (Instant Messenger)/P2P (Peer to
Peer) application. CSM profile can be used in Filter Setup page.
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Profile Name
Type a name for the CSM profile.
VoIPon
www.voipon.co.uk
Tel: +44 (0)1245 808195
Fax: +44 (0)1245 808299

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top