Page 56 / 160 Scroll up to view Page 51 - 55
Control Access to the Internet
56
AC1200 Smart WiFi Router with External Antennas
b.
Enter the starting port and ending port numbers.
If the service uses a single port number, enter that number in both fields. To find out
which port numbers the service or application uses, you can contact the publisher of
the application, ask user groups or newsgroups, or search on the Internet.
9.
Select a filtering option:
Only This IP Address
. Block services for a single computer.
IP Address Range
. Block services for a range of computers with consecutive IP
addresses on your network.
All lP Addresses
. Block services for all computers on your network.
10.
Click the
Add button
.
Your changes are saved.
Schedule When to Block Internet Sites and Services
When you schedule blocking, the same schedule is used to block sites and to block services.
For information about how to specify what you want the router to block, see
Use Keywords to
Block Internet Sites
on page
53 and
Block Services from the Internet
on page
54.
To schedule blocking:
1.
Launch a web browser from a computer or wireless device that is connected to the
network.
2.
Type
or
.
A login screen displays.
3.
Enter the router user name and password.
The user name is
admin
. The default password is
password
. The user name and
password are case-sensitive.
The BASIC Home screen displays.
Page 57 / 160
Control Access to the Internet
57
AC1200 Smart WiFi Router with External Antennas
4.
Select
ADVANCED > Security > Schedule
.
5.
Specify when to block keywords and services:
Days to Block
. Select the check box for each day that you want to block the
keywords, or select the
Every Day
check box, which automatically selects the check
boxes for all days.
Time of Day to Block
. Select a start and end time in 24-hour format, or select
All
Day
for 24-hour blocking.
6.
Select your time zone from the list.
7.
If you live in a region that observes daylight saving time, select the
Automatically adjust
for daylight savings time
check box.
8.
Click the
Apply
button.
Your settings are saved.
Avoid Blocking on a Trusted Computer
You can exempt one trusted computer from blocking. The computer that you exempt must be
assigned a fixed IP address. You can use the reserved IP address feature to specify the IP
address. See
Manage Reserved LAN IP Addresses
on page
114.
To specify a trusted computer:
1.
Launch a web browser from a computer or wireless device that is connected to the
network.
2.
Type
or
.
A login screen displays.
3.
Enter the router user name and password.
Page 58 / 160
Control Access to the Internet
58
AC1200 Smart WiFi Router with External Antennas
The user name is
admin
. The default password is
password
. The user name and
password are case-sensitive.
The BASIC Home screen displays.
4.
Select
ADVANCED > Security > Block Sites
.
The Block Sites screen displays.
5.
Scroll down and select the
Allow trusted IP address to visit blocked sites
check box.
6.
In the
Trusted IP Address
field, enter the IP address of the trusted computer.
7.
Click the
Apply
button.
Your changes are saved.
Set Up Security Event Email Notifications
The router can email you its logs of router activity. The log records router activity and security
events such as attempts to access blocked sites or services.
To set up email notifications:
1.
Launch a web browser from a computer or wireless device that is connected to the
network.
2.
Type
or
.
A login screen displays.
3.
Enter the router user name and password.
The user name is
admin
. The default password is
password
. The user name and
password are case-sensitive.
The BASIC Home screen displays.
4.
Select
ADVANCED > Security >
E-mail
.
Page 59 / 160
Control Access to the Internet
59
AC1200 Smart WiFi Router with External Antennas
5.
Select the
Turn Email Notification On
check box.
6.
In the
Your Outgoing Mail Server
field, enter the name of your ISP outgoing (SMTP) mail
server (such as mail.myISP.com).
You might be able to find this information in the configuration screen of your email
program. If you leave this field blank, log and alert messages are not sent.
7.
In the
Send to This E-mail Address
field, type the email address to which logs and alerts
are to be sent.
This email address is also used for the From address. If this field is blank, log and alert
messages are not sent.
8.
If your outgoing email server requires authentication, select the
My Mail Server requires
authentication
check box and do the following:
a.
In the
User Name
field, type the user name for the outgoing email server.
b.
In the
Password
field, type the password for the outgoing email server.
c.
(Optional) in the
Outgoing Mail Server Port Number
field, enter a port number.
9.
(Optional) Select the
Send Alerts Immediately
check box.
Email alerts are sent immediately when someone attempts to visit a blocked site.
10.
(Optional) Send logs based on a schedule. Specify these settings:
From
Send logs according to this schedule
list, select the schedule type.
From the
Day
list, select the day.
From the
Time
list, select the time, and select the
am
or
pm
radio button.
11.
Click the
Apply
button.
Your settings are saved.
Logs are sent automatically according to the schedule that you set. If the log fills before
the specified time, it is sent. After the log is sent, it is cleared from the router memory. If
the router cannot email the log and the log buffer fills, the router overwrites the log.
Page 60 / 160
60
6
6.
Share a Storage Device Attached
to the Router
This chapter describes how to access and manage a storage device attached to your router.
ReadySHARE lets you access and share a USB storage device connected to the router. (If your
storage device uses special drivers, it is not compatible.)
Note:
The USB ports on the router can be used only to connect USB
storage devices like flash drives or hard drives or a printer. Do not
connect computers, USB modems, CD drives, or DVD drives to the
router USB port.
This chapter contains the following sections:
USB Device Requirements
Connect a USB Device to the Router
Access an Storage Device Connected to the Router
Map a USB Device to a Windows Network Drive
Back Up Windows Computers with ReadySHARE Vault
Back Up Mac Computers with Time Machine
Control Access to a Storage Device
Use FTP Within the Network
View Network Folders on a Device
Add a Network Folder on a Storage Device
Edit a Network Folder on a Storage Device
Use the Router as a ReadyDLNA Media Server
Approve USB Devices
Safely Remove a USB Device
For more information about ReadySHARE features, visit
www.netgear.com/readyshare
.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top