Page 56 / 134 Scroll up to view Page 51 - 55
48
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
Wireless-N Gigabit Security Router with VPN
Restrict WEB Features
Block. Select the Web features that you wish to restrict. All those features could place security concern to your
PCs on the LAN side. You have to balance your needs on those applications and security. The default is
unselected.
Java
: Java is a programming language for websites. If you deny Java, you run the risk of not having
access to Internet sites created using this programming language.
Cookies
: A cookie is data stored on your PC and used by Internet sites when you interact with them, so
you may not want to deny cookies.
ActiveX
: ActiveX is a Microsoft (Internet Explorer) programming language for websites. If you deny
ActiveX, you run the risk of not having access to Internet sites using this programming language. Also,
Windows Update uses ActiveX, so if this is blocked, Windows update will not work.
Proxy
: If local users have access to WAN proxy servers, they may be able to circumvent the Router's
content filters and access Internet sites blocked by the Router. Denying Proxy will block access to any
WAN proxy servers.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Downloaded from
www.Manualslib.com
manuals search engine
Page 57 / 134
49
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
Wireless-N Gigabit Security Router with VPN
IP Based ACL
This screen shows a summary of configured IP based Access List. The Access List is used to restrict traffic going
through the Router either from WAN or LAN port. There are two ways to restrict data traffic. You can block specific
types of traffic according to your ACL definitions. Or you can allow only specific types of traffic according to your
ACL definition. The ACL rules will be read according to its priority. If there is a match for a packet, the action will
be taken and following lower priority rules will not be checked against this packet.
Note that the higher the number of rules that need to be checked against packets, the lower the throughput. Use
ACL rules with caution.
There are two default rules in the table that cannot be deleted. The first rule will allow all traffic coming in from
LAN port to pass the Router. The second rule will allow all traffic coming in from WAN port. These two rules have
the lowest priority, so without adding any user defined rules, all the packets can be passed through from both
WAN and LAN sides.
The rule will be enabled when the Enable button is checked, and when Date and Time are matched. If any of
conditions are not met, the rule will not be used to check against packets.
The following are descriptions on each of the fields in the ACL Table:
Priority
: This defines the order on which rule is checked against first. The smaller number has higher priority.
The default rules will always be checked last.
Enable
: This tells the Router if the rule is active or not. You can have rules defined in the ACL Table but in an
inactive state. The administrator can decide on when to enable specific ACL rules manually.
Action
: This defines how the rule is to affect the traffic. It can be either
Allow
or
Deny
. If the rule is matched and
the action is
Allow
, the packet will be forwarded. If the rule is matched and the action is
Deny
, the packet will be
dropped.
Service
: You can either select one of the pre-defined services in the drop-down menu or you can define new
services by clicking the
Service
Management
button. Once you defined your own service, it will be listed on the
top of the drop-down menu. You can also select
ALL
to allow or block all types of IP traffic.
The User-defined Service GUI page can be either accessed from the New Rule screen by clicking
Service
Management
button, or you can access it directly from the 2nd layer tab under Firewall.
Source Interface
: Select
LAN
,
WAN
, or
ANY
interface.
Figure 6-30: Firewall - IP Based ACL
Figure 6-31: Firewall - IP Based ACL
(pre-defined services)
Downloaded from
www.Manualslib.com
manuals search engine
Page 58 / 134
50
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
Wireless-N Gigabit Security Router with VPN
Source
: This is the source IP address to be matched against. You can define a
Single
IP address, a
Range
of IP
addresses (start IP and end IP), a
Net
work (IP Prefix and Network Mask), or
ANY
IP addresses.
Destination
: This is the destination IP address to be matched against. You can define a
Single
IP address, a
Range
of IP addresses (start IP and end IP), a
Net
work (IP Prefix and Network Mask), or
ANY
IP addresses.
Time
: Displays the time period this rule will be enabled (used together with Date). It can be set to
Any Time
.
Date
: Displays the days in a week this rule will be enabled (used together with Time). It can be set to
Any Day
.
Edit
button: Use this button to go to
Edit IP ACL Rule
screen and modify this rule.
Delete
button: Use this button to delete the ACL rule from the list.
Following is a description of the buttons in the IP Based ACL screen:
Page Selections
: You can select specific page of ACL list from the drop-down menu to be displayed. Or you can
navigate them page by page through
Previous Page
and
Next Page
button.
Add New Rule
: Click this button to enter the page to define a new ACL rule.
Disable All Rule
: Click this page to disable all the user defined rules.
Delete All Rule
: Click this page to delete all the user defined rules.
Edit IP ACL Rule
This Web page can be entered only through
IP Based ACL
Tab. You can enter this page by clicking
Add New Rule
button on that page.
New Rule
Action
: Select either
Allow
or
Deny
. Default is
Allow
.
Service
: Select ALL or pre-defined (or user-defined) services from the drop-down menu.
Log
: If checked, this ACL rule will be logged when a packet match happens.
Figure 6-32: Firewall - IP Based ACL (Service
definition)
Figure 6-33: Firewall - Edit IP ACL Rule
Downloaded from
www.Manualslib.com
manuals search engine
Page 59 / 134
51
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
Wireless-N Gigabit Security Router with VPN
Log Prefix
: This string will be attached in front of the log for the matched event.
Source Interface
: Select
LAN
,
WAN
, or
ANY
interface.
Source
: The source IP address to be matched against. You can define a
Single
IP address, a
Range
of IP
addresses (start IP and end IP), a
Net
work (IP Prefix and Network Mask), or
ANY
IP addresses.
Destination
: The destination IP address to be matched against. You can define a
Single
IP address, a
Range
of IP
addresses (start IP and end IP), a
Net
work (IP Prefix and Network Mask), or
ANY
IP addresses.
Service Management
Button: Click this button and the Service Tab to add new service type to the Service
drop-down menu.
Scheduling
Time
: Enter the time period this rule will be applied (used together with Date). It can be set to Any Time.
Date
: Enter the days in a week this rule will be applied (used together with Time). It can be set to Any Day.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Downloaded from
www.Manualslib.com
manuals search engine
Page 60 / 134
52
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
Wireless-N Gigabit Security Router with VPN
Internet Access Policy
Access to the Internet can be managed by policies. A policy consists of four components. You need to define the
PCs (MAC or IP address) to apply this policy, either
Deny
or
Allow
Internet service, what time and date to enable
this policy, and what URLs or Keywords to apply this policy.
Use the settings on this screen to establish an access policy. Selecting a policy from the drop-down menu will
display that policy's settings. You can then perform the following operations:
Create a Policy - see instructions below.
Delete the current policy - click the
Delete
button.
View all policies - click the
Summary
button. On the Summary screen, the policies are listed with the
following information: No., Policy Name, Days, Time, and a checkbox to delete (clear) the policy. To delete
a policy, check the checkbox in the Delete column, and click the Delete button
View or change the PCs covered by the current policy - click the
Edit List of PCs
button.
On the List of PCs screen, you can define PCs by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs.
To create an Internet Access policy:
1.
Select the desired policy number from the
Internet Access Policy
drop-down menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, select the
Enable
option.
4.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The List of PCs screen will
appear in a sub-window. You can select a PC by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your changes.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the List of PCs screen.
6.
Decide what Days and what Times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Enter a range of hours and minutes during which the
policy will be in effect, or select
24 Hours
.
Figure 6-34: Firewall - Internet Access Policy
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top