Page 41 / 121 Scroll up to view Page 36 - 40
Reference Manual for the Model RP614 v2 Web Safe Router
Content Filtering
3-7
Using Java, ActiveX, and cookies Filtering.
What are these items and what can I do about them?
ActiveX and Java programs can be embedded in websites, and will be executed by your
computer. These programs may sometimes include malicious content.
Cookies are small files that a website can store on your computer to track your activity.
Some cookies can be helpful, but some may compromise your privacy.
To block these items, follow these steps:
1.
Click WAN Setup link on the Advanced section of the main menu.
2.
Type the IP address for that server. To remove the default DMZ server, replace the IP address
numbers with all zeros.
3.
To block ActiveX, Java, Cookies, or Web Proxy functions for all Internet sites, click the check
box next to the function and then click Apply.
Viewing Logs of Web Access or Attempted Web Access
The log is a detailed record of what websites you have accessed or attempted to access. Up to 128
entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and
no log entries will be made for the Trusted User. An example is shown below:
Figure 3-6: Logs menu
Page 42 / 121
Reference Manual for the Model RP614 v2 Web Safe Router
3-8
Content Filtering
Log entries are described in
Table 3-1
Log action buttons are described in
Table 3-2
Table 3-1.
Log entry descriptions
Field
Description
Number
The index number of the content filter log entries. 128 entries
are available numbered from 0 to 127. The log will keep the
record of the latest 128 entries.
Date and Time
The date and time the log entry was recorded.
Source IP
The IP address of the initiating device for this log entry.
Action
This field displays whether the access was blocked or allowed.
The name or IP address of the website or newsgroup visited or
attempted to access.
Table 3-2.
Log action buttons
Field
Description
Refresh
Click this button to refresh the log screen.
Clear Log
Click this button to clear the log entries.
Send Log
Click this button to email the log immediately.
Page 43 / 121
Reference Manual for the Model RP614 v2 Web Safe Router
Content Filtering
3-9
Configuring E-Mail Alert and Web Access Log Notifications
In order to receive logs and alerts by email, you must provide your email information in the E-Mail
menu, shown below:
Figure 3-7: Email menu
Turn e-mail notification on
Check this box if you wish to receive e-mail logs and alerts from the router.
Your outgoing mail server
Enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You
may be able to find this information in the configuration menu of your e-mail program. If you
leave this box blank, log and alert messages will not be sent via e-mail.
Page 44 / 121
Reference Manual for the Model RP614 v2 Web Safe Router
3-10
Content Filtering
Send to this e-mail address
Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used
as the From address. If you leave this box blank, log and alert messages will not be sent via
e-mail.
You can specify that logs are automatically sent to the specified e-mail address with these options:
Send alert immediately
Check this box if you would like immediate notification of attempted access to a blocked site.
Send logs according to this schedule
Specifies how often to send the logs: Hourly, Daily, Weekly, or When Full.
Day for sending log
Specifies which day of the week to send the log. Relevant when the log is sent weekly or
daily.
Time for sending log
Specifies the time of day to send the log. Relevant when the log is sent daily or weekly.
If the Weekly, Daily or Hourly option is selected and the log fills up before the specified
period, the log is automatically e-mailed to the specified e-mail address. After the log is sent,
the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log
buffer may fill up. In this case, the router overwrites the log and discards its contents.
The RP614 v2 router uses the Network Time Protocol (NTP) to obtain the current time and date
from one of several Network Time Servers on the Internet. In order to localize the time for your
log entries, you must specify your Time Zone:
Time Zone
Select your local time zone. This setting will be used for the blocking schedule and for
time-stamping log entries.
Daylight Savings Time
Check this box if your time zone is currently under daylight savings time.
Page 45 / 121
Maintenance
4-1
Chapter 4
Maintenance
This chapter describes how to use the maintenance features of your Model RP614 v2 Web Safe
Router. These features can be found by clicking on the Maintenance heading in the Main Menu of
the browser interface.
Viewing Router Status Information
The Router Status menu provides a limited amount of status and usage information. From the
Main Menu of the browser interface, click on Maintenance, then select System Status to view the
System Status screen, shown below.
Figure 4-1.
Router Status screen

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top