Page 91 / 298
Scroll up to view Page 86 - 90
igor2930 Series User’s Guide
83
Name
Type a name for this profile, e.g., game.
Contents
Type the content for such profile. For example, type
gambling
as Contents. When you browse the webpage, the page with
gambling information will be watched out and be
passed/blocked based on the configuration on Firewall
settings.
3.5.6 Keyword Group
This page allows you to bind several keyword objects into one group. The keyword groups
set here will be chosen as black /white list in
CSM
>>URL Web Content Filter Profile
.
Set to Factory Default
Clear all profiles.
Click the number under Index column for setting in detail.
Page 92 / 298
Vigor2930 Series User’s Guide
84
Name
Type a name for this group.
Available Keyword
Objects
You can gather keyword objects from Keyword Object page
within one keyword group. All the available Keyword
objects that you have created will be shown in this box.
Selected Keyword Objects
Click
button to add the selected Keyword objects in
this box.
3.5.7 File Extension Object
This page allows you to set eight profiles which will be applied in
CSM>>URL Content
Filter
. All the files with the extension names specified in these profiles will be processed
according to the chosen action.
Profile 1 with name of “default” is the default profile, some files with the file extensions
specified in this profile will be ignored and not be scanned by Vigor router.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details.
Page 93 / 298
igor2930 Series User’s Guide
85
Profile Name
Type a name for this profile.
Type a name for such profile and check all the items of file extension that will be processed
in the router. Finally, click
OK
to save this profile.
3.5.8 IM Object
You can define policy profiles for IM (Instant Messenger) application. The object profile(s)
configured here will be seen and adopted in
CSM>>APP Enforcement Profile
page.
Page 94 / 298
Vigor2930 Series User’s Guide
86
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Profile Name
Type a name for the CSM profile.
Check for Disallow
Check the items that disallow to use. Any device that uses
such profile might not be allowed to access into the forbidden
items.
3.5.9 P2P Object
You can define policy profiles for P2P (Point-to-Point) application. The object profile(s)
configured here will be seen and adopted in
CSM>>APP Enforcement Profile
page.
Page 95 / 298
igor2930 Series User’s Guide
87
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Profile Name
Type a name for the CSM profile.
Check for Disallow
Check the items that disallow to use. Any device that uses
such profile might not be allowed to access into the forbidden
items.
In the above figure, BitTorrent protocol is disallowed if you apply such object profile as
filtering rule (setting in
Firewall
).