Page 36 / 70 Scroll up to view Page 31 - 35
Barricade g Wireless Router with USB Print Server
Manual
8.6.3 | URL Blocking
The URL Blocking feature of the Barricade limits access to website domains (i.e.
www.somesite.com
) or by using keywords which will block any websites that have that keyword in
the URL. This feature is an ideal way to protect your family members from questionable content on
the Internet
NOTE:
This blocking feature applies to the words and URLs typed in the Address Bar of your
Browser.
36
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 70
Barricade g Wireless Router with USB Print Server
Manual
8.6.4 | Schedule Rule
This section allows you to configure up to 10 schedule rules that can be used with the Access
Control Rule feature.
To create a Schedule Rule, click the [Add Schedule Rule] link to access the [Edit Schedule Rule]
configuration page.
Name:
The Name of your schedule rule, for example “block kids internet”
Comment:
A comment about the schedule rule, for example the time period “7AM – 7PM”
Activate Time Period:
This is the span of time that you want the Access Control rule active and
also the day of the week that you want it active.
NOTE
: The Start and End Time are set in military time (1705 = 5:05PM)
37
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 70
Barricade g Wireless Router with USB Print Server
Manual
8.6.5 | Intrusion Detection
The Barricade g inspects packets at the application layer, and maintains TCP and UDP session
information, including timeouts and the number of active sessions. The Barricade g also provides
the ability to detect and prevent certain types of network attacks such as DoS attacks. Network
attacks that deny access to a network device are called denial-of-service (DoS) attacks. Denials of
Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. The
goal is not to steal information, but to disable a device or network so users no longer have access
to network resources.
By using inspected information and timeout/threshold criteria, the Barricade g provides following
DOS attacks prevention: Ping of Death (Ping flood) attack, SYN flood attack, IP fragment attack
(Teardrop Attact) , Brute-force attack, Land Attack, IP Spoofing attack, IP with zero length, TCP
null scan (Port Scan Attach), UDP port loopback, Snork Attack etc.
SPI and Anti-DoS firewall protection
: Enable/Disable the SPI functions of firewall.
RIP Defect
: Enable/Disable the RIP Defect function of firewall.
Discard Ping to WAN
:
When this feature is enabled, any host on the WAN cannot ping this product.
This helps avoid unnecessary attacks from the WAN side because your connection is invisible. It is
recommended that you enable this option for security.
Stateful Packet Inspection (SPI):
Use this option to define the type of data you want the SPI
firewall to scan.
38
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 70
Barricade g Wireless Router with USB Print Server
Manual
Email Alert
: Configure this option if you want the Barricade to email when hackers attempt to
attack your network to a specific email address. You will need to configure your email address,
username and password, as well as a SMTP server and POP3 to send the mail through.
NOTE
: Some ISPs require that you configure the POP3 server to use there outgoing or SMTP server.
Connection Policy and DoS Detect Criteria
: Use both of these sections to tune the Barricade
Firewall.
Note
: For most users the defaults settings will work fine. If you are having throughput slow downs,
then you may want to adjust some of the values under the [DoS Detect Criteria] section:
Change:
max incomplete sessions from same host from 10 to 30
incomplete detect sensitive time period from 300 to 600
flooding cracker block from 300 to 60
39
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 70
Barricade g Wireless Router with USB Print Server
Manual
8.6.6 | DMZ (Demilitarized Zone)
If you have a client PC that cannot run an Internet application properly from behind the firewall,
then you can open the client PC up to unrestricted two-way Internet access. Enter the LAN IP
address of a DMZ host and click “Enable”.
NOTE
: Adding a client to the DMZ (Demilitarized Zone) may expose your local network to a variety
of security risks. Only use this option as a last resort.
WAN IP
NOTE:
To support the 7 other DMZ hosts the IP Address entered must be in the same range as the
WAN IP Address.
40
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top