Page 56 / 107 Scroll up to view Page 51 - 55
Reference Manual for the RangeMax 240 Wireless Router WPNT834
Content Filtering
5-3
v1.0, November 2005
If you wish to block all Internet browsing access during a scheduled period, enter the keyword
“.” and set the schedule in the Schedule menu.
To specify a Trusted User, enter that computer’s IP address in the Trusted User box and click
Apply
.
You may specify one Trusted User, which is a computer that is exempt from blocking and
logging. Since the Trusted User is identified by IP address, you should configure that
computer with a fixed IP address.
Blocking Access to Internet Services
The WPNT834 router allows you to block the use of certain Internet services by computers on
your network. This is called service blocking or port filtering. The Block Services menu is shown
below:
Services are functions performed by server computers at the request of client computers. For
example, Web servers serve Web pages, time servers serve time and date information, and game
hosts serve data about other players’ moves. When a computer on your network sends a request for
service to a server computer on the Internet, the requested service is identified by a service or port
number. This number appears as the destination port number in the transmitted IP packets. For
example, a packet that is sent with destination port number 80 is an HTTP (Web server) request.
To enable service blocking, select either
Per Schedule
or
Always
, then click
Apply
. If you want to
block by schedule, be sure to specify a time period in the Schedule menu. For scheduling, see
“Scheduling When Blocking Will Be Enforced” on page 5-5
.
Figure 5-2
Page 57 / 107
Reference Manual for the RangeMax 240 Wireless Router WPNT834
5-4
Content Filtering
v1.0, November 2005
To specify a service for blocking, click
Add
. The Block Services Setup menu appears, as shown
below:
From the
Service Type
list, select the application or service to be allowed or blocked. The list
already displays several common services, but you are not limited to these choices. To add any
additional services or applications that do not already appear, select
User Defined
.
Configuring a User Defined Service
To define a service, first you must determine which port number or range of numbers is used by
the application. The service numbers for many common protocols are defined by the Internet
Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service
numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of
the application. This information can usually be determined by contacting the publisher of the
application or from user groups of newsgroups.
Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter
that number in both boxes.
If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are
not sure, select
Both
.
Figure 5-3
Page 58 / 107
Reference Manual for the RangeMax 240 Wireless Router WPNT834
Content Filtering
5-5
v1.0, November 2005
Blocking Services by IP Address Range
Under “Filter Services For”, you can block the specified service for a single computer, a range of
computers (having consecutive IP addresses), or all computers on your network.
Scheduling When Blocking Will Be Enforced
The WPNT834 router allows you to specify when blocking is enforced. The Schedule menu is
shown below:
Use this schedule for blocking content.
Days to Block. Select days to block by checking the appropriate boxes. Select
Every day
to
check the boxes for all days. Click
Apply
.
Time of Day to Block. Select a start and end time in 24-hour format. Select
All day
for 24-
hour blocking. Click
Apply
.
Be sure to select your Time Zone in the E-Mail menu.
Figure 5-4
Page 59 / 107
Reference Manual for the RangeMax 240 Wireless Router WPNT834
5-6
Content Filtering
v1.0, November 2005
Viewing Logs of Web Access or Attempted Web Access
The log is a detailed record of the Web sites you have accessed or attempted to access. Up to 128
entries are stored in the log. Log entries only appear when keyword blocking is enabled, and no log
entries are made for the Trusted User. An example is shown below:
Log entries are described in the following table.
Figure 5-5
Table 5-1. Log entry descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Source IP
The IP address of the initiating device for this log entry.
Target address
The name or IP address of the Web site or newsgroup visited or
attempted to access.
Action
This field displays whether the access was blocked or allowed.
Page 60 / 107
Reference Manual for the RangeMax 240 Wireless Router WPNT834
Content Filtering
5-7
v1.0, November 2005
Log action buttons are described in the following table.
Configuring E-Mail Alert and Web Access Log Notifications
In order to receive logs and alerts by E-mail, you must provide your E-mail information in the E-
Mail menu, shown below:
Turn e-mail notification on.
Check this box if you wish to receive e-mail logs and alerts from the router.
Your outgoing mail server .
Enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You
may be able to find this information in the configuration menu of your e-mail program. If you
leave this box blank, log and alert messages will not be sent via e-mail.
Table 5-2. Log action buttons
Field
Description
Refresh
Click this button to refresh the log screen.
Clear Log
Click this button to clear the log entries.
Send Log
Click this button to E-mail the log immediately.
Figure 5-6

Rate

3.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top