Page 96 / 298 Scroll up to view Page 91 - 95
Vigor2930 Series User’s Guide
88
3.5.10 Protocol Object
This page allows you to set 32 profiles for applications in protocol communication. These
profiles will be applied in
CSM>> APP Enforcement Profile
for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. Internet protocols are
listed in the page for you to choose to disallow people using. Any computer controlled or
passed through the router will be restricted by this profile if it tries to use the protocol to
communicate with others.
Simple check the box (es) and then click
OK
. Later, in the
CSM>> APP Enforcement
Profile
page, you can use
Protocol Object
drop down list to choose the proper profile
configured here as the standard for the host(s) to follow.
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the
host. Finally, click
OK
to save this profile.
Page 97 / 298
igor2930 Series User’s Guide
89
3.5.11 Misc Object
You can define policy profiles for Misc application. The object profile(s) configured here
will be seen and adopted in
CSM>>IM/P2P Profile
page.
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Page 98 / 298
Vigor2930 Series User’s Guide
90
Profile Name
Type a name for the CSM profile.
Check for Disallow
Check the items that disallow to use. Any device that uses
such profile might not be allowed to access into the forbidden
items.
Page 99 / 298
igor2930 Series User’s Guide
91
3.6 CSM
CSM
is an abbreviation of
Content Security Management
which is used to control IM/P2P
usage, filter the web content and URL content to reach a goal of security management.
Note:
The priority of URL Content Filter is higher than Web Content Filter.
3.6.1 APP Enforcement Profile
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar
situation for corporation towards peer-to-peer applications since file-sharing can be
convenient but insecure at the same time.
You can define policy profiles for IM (Instant Messenger)/P2P (Peer to Peer)/Protocol
application. This page allows you to set 32 profiles for different requirements. The APP
Enforcement Profile will be applied in
Default Rule
of
Firewall>>General Setup
for
filtering.
Set to Factory Default
Clear all profiles.
Profile
Display the number of the profile which allows you to click to
set different policy.
Name
Display the name of the
APP Enforcement Profile.
Click the number under Index column for settings in detail.
Page 100 / 298
Vigor2930 Series User’s Guide
92
Profile Name
Type a name for the CSM profile.
Each profile can contain three objects settings, IM Object, P2P Object and Misc Object.
Such profile can be applied in the
Firewall>>General Setup
and
Firewall>>Filter Setup
pages as the standard for the host(s) to follow.
3.6.2 URL Content Filter Profile
To provide an appropriate cyberspace to users, Vigor router equips with
URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user’s access to the
website. You may imagine
URL Content Filter
as a well-trained convenience-store clerk
who won’t sell adult magazines to teenagers. At office,
URL Content Filter
can also provide
a job-related only environment hence to increase the employee work efficiency. How can
URL Content Filter work better than traditional firewall in the field of filtering? Because it
checks the URL strings or some of HTTP data hiding in the payload of TCP packets while
legacy firewall inspects packets based on the fields of TCP/IP headers only.
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It’s very common that malicious codes conceal in the executable
objects, such as ActiveX, Java Applet, compressed files, and other executable files. Once
downloading these types of files from websites, you may risk bringing threat to your system.
For example, an ActiveX control object is usually used for providing interactive web feature.
If malicious code hides inside, it may occupy user’s system.
Based on the list of user defined keywords, the
URL Content Filter
facility in Vigor router
inspects the URL string in every outgoing HTTP request. No matter the URL string is found
full or partial matched with a keyword, the Vigor router will block the associated HTTP
connection.
For example, if you add key words such as “sex”, Vigor router will limit web access to web
sites or web pages such as “www.sex.com”, ”www.backdoor.net/images/sex/p_386.html”.
Or you may simply specify the full or partial URL such as “www.sex.com” or “sex.com”.
Also the Vigor router will discard any request that tries to retrieve the malicious code.
Click
CSM
and click
URL Content Filter Profile
to open the setup page.

Rate

4 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top