Page 71 / 155 Scroll up to view Page 66 - 70
Configuring Network Security and Controlling Internet Access
Access Restrictions > Internet Access
Cisco WRP400 User Guide
69
7
IPSec Passthrough:
Internet Protocol Security (IPSec) is a suite of protocols
used to implement secure exchange of packets at the IP layer. To allow IPSec
tunnels to pass through the WRP400, keep the default, Enabled.
PPTP:
Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the
Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow
PPTP tunnels to pass through the WRP400, keep the default, Enabled.
L2TP Passthrough:
Layer 2 Tunneling Protocol is the method used to
enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow
L2TP tunnels to pass through the WRP400, keep the default, Enabled.
Access Restrictions > Internet Access
You can use the Internet Access Policy screen to block or allow specific kinds of
Internet usage and traffic, such as Internet access, designated services, and
websites during specific days and times.
NOTE
After you enter settings on this page, click Save Settings to apply your changes, or
click Cancel Changes to cancel your changes.
Page 72 / 155
Configuring Network Security and Controlling Internet Access
Access Restrictions > Internet Access
Cisco WRP400 User Guide
70
7
Figure 36
Access Restrictions > Internet Access
Access
Policy:
Select a policy from the drop-down list to display that
policy’s settings. You can then enter or modify the settings. Be sure to save
your changes before selecting another policy from the drop-down list.
Page 73 / 155
Configuring Network Security and Controlling Internet Access
Access Restrictions > Internet Access
Cisco WRP400 User Guide
71
7
Delete This Entry:
To delete an access policy, select the policy’s number
from the Access Policy list, and then click this button.
Summary:
To view all policies, click this button. The Summary appears in a
separate window. The policies are listed with the following information: No.
(number), Policy Name, Access, Days, Time of Day, and status (Enabled). To
enable a policy, check Enabled. To delete a policy, click Delete. Click Save
Settings to save your changes, or click Cancel Changes to cancel your
changes. To return to the Internet Access Policy screen, click Close.
Enter Policy Name:
Enter a name for the policy that you selected in the
Access Policy list.
Status:
Policies are disabled by default. To enable the selected policy,
select Enabled.
Page 74 / 155
Configuring Network Security and Controlling Internet Access
Access Restrictions > Internet Access
Cisco WRP400 User Guide
72
7
Applied PCs:
Click
Edit List
to select the computers that will be affected by
the policy that you selected in the Access Policy list. The List of PCs window
appears.
Choose the PCs that will be affected by this policy:
-
MAC Address:
Enter a MAC address that you want to add to the list.
-
IP Address:
Enter the final octet of an IP address that you want to add to
the list.
-
IP Address Range:
Enter the final octet of an IP address in the first box,
and then enter the final octet of another IP address in the second box, to
create a range of IP addresses to add to the list.
Click Save Settings to save your changes, or click Cancel Changes to
cancel your changes. To return to the Internet Access Policy screen, click
Close.
Access Restriction:
Select the appropriate option, Deny or Allow,
depending on whether you want to block or allow Internet access for the
computers that are listed on the List of PCs screen.
Page 75 / 155
Configuring Network Security and Controlling Internet Access
Access Restrictions > Internet Access
Cisco WRP400 User Guide
73
7
Schedule:
Decide which days and what times you want the selected policy
to be enforced. Select the individual days during which the policy will be in
effect, or select Everyday. Then enter a range of hours and minutes during
which the policy will be in effect, or select 24 Hours.
Website Blocking by URL Address:
You can block websites with specific
URL addresses. Enter each URL in a separate URL field.
Website Blocking by Keyword:
You can block websites using specific
keywords. Enter each keyword in a separate Keyword field.
Blocked Applications:
You can filter access to various services accessed
over the Internet, such as FTP or telnet. You can block up to three
applications per policy.
-
From the Application list, select the application you want to block. Then
click the
>>
button to move it to the Blocked List. To remove an
application from the Blocked List, select it and click the
<<
button.
-
If the application you want to block is not listed or you want to edit a
service’s settings, enter the application’s name in the Application Name
field. Enter its range in the Port Range fields. Select its protocol from the
Protocol drop-down menu. Then click
Add
.
-
To modify a service, select it from the Application list. Change its name,
port range, and/or protocol setting. Then click
Modify
.
-
To delete a service, select it from the Application list. Then click
Delete
.
Creating or Modifying an Internet Access Policy
Follow this procedure to create or modify an Internet Access Policy.
STEP 1
Select a number from the
Access Policy
drop-down menu.
STEP 2
Enter a name in the
Policy Name
field.
STEP 3
To enable this policy, select
Enabled
.
STEP 4
Click
Edit List
to select the computers that will be affected by this policy.
a.
In the List of PCs window, enter individual MAC addresses or IP addresses, or
enter IP address ranges.
b.
Click
Save Settings
to apply your changes, or click
Cancel Changes
to cancel
your changes. Then click
Close
close the window.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top