Page 61 / 95 Scroll up to view Page 56 - 60
59
Intrusion Detection:
Check “Enable” if you wish to detect intruders accessing your
computer without permission.
Alert Mail:
Select this check box to use Alert Mail.
Alert Mail Time:
Set the time for receiving Alert mail.
Your E-Mail:
Set your email address.
Recipient’s E-mail:
Set the Recipient’s email address to which
the E-<mail notification
is sent.
SMTP server:
Set the SMTP (mail) server address.
4.3.4.5 Block WAN Request
Check “Enable” if you wish to exclude outside PING requests from reaching this router.
4.3.4.6 URL Filter
URL (Uniform Resource Locator – e.g. an address in the form of
or
) filter rules allow you to prevent users on your network from
accessing particular websites from their URL. There are no pre-defined URL filter rules; you
can add filter rules to meet your requirements.
Page 62 / 95
60
Active:
Select
Yes
from the drop down list box to enable or disable the URL Filter feature.
Always Block:
Select to always check URL filter rules (i.e. at all hours of the day).
Block from:
Specify the time period to check URL filter rules (e.g. during work hours).
Keywords Filtering:
Allows blocking by specific keywords within a particular URL rather
than having to specify a complete URL (e.g. to block any image called “advertisement.gif”).
When enabled, your specified keywords list is checked to see if any keywords are present in
URLs accessed to determine if the connection attempt should be blocked. Note that the URL
filter blocks web browser (HTTP) connection attempts using port 80 only.
For example, the URL
would be dropped since the keyword
“abcde” occurs in the URL.
Page 63 / 95
61
Domains Filtering:
Checks the domain name in URLs accessed against your list of
domains to block or allow. If it matches, the URL request is sent (Trusted) or dropped
(Forbidden). The checking procedure is:
1. Check the domain in the URL to determine if it is in the trusted list. If yes, the connection
attempt is sent to the remote web server.
2. If not, it is checked with the forbidden list. If present, the connection attempt is dropped.
3. If the packet matches neither of the above, it is sent to the remote web server.
4. Please note that only the domain is specified, not the full URL. For example to block
traffic to
www.sex.com
, enter “sex” or “sex.com” instead of “www.sex.com”. In the
example below, the URL request for
www.abc.com
is sent to the remote web server
because it is listed in the trusted list, while the URL request for
www.sex
or
www.sex.com
is dropped because sex.com is in the forbidden list.
Restrict URL Features
~
Block Java Applet:
Blocks Web content which includes the Java Applet to prevent
someone who wants to damage your system via the standard HTTP protocol.
~
Block ActiveX:
Blocks ActiveX
~
Block Cookies:
Blocks Cookies
~
Block Proxy:
Blocks Proxy
Page 64 / 95
62
4.3.5 QoS (Quality of Service)
Quality of Service Introduction
If you’ve ever found your ‘net’ speed has slowed to a crawl because another family
member is using a P2P file sharing program, you’ll understand why the Quality of
Service features in routers is such a breakthrough for home users and office users
.
QOS: Keeping Your Net Connection Fast and Responsive
Configurable by source IP address, destination IP address, protocol, and port, the Quality of
Service (QOS) gives you full control over which types of outgoing data traffic should be given
priority by the router, ensuring bandwidth-consumption data like gaming packets,
latency-sensitive application like voice, or even mission critical files, move through the router
at lightning speed, even under heavy load. You can throttle the speed at which different
types of outgoing data pass through the router. In addition, you can simply change the
priority of different types of upload data and let the router sort out the actual speeds.
QOS Setup
Please choose the
QOS
in the
Configuration
item of the left window as depicted below.
After clicking the QOS item, you can Add/Edit/Delete a QOS policy.
This page will show the
brief information for policies you have added or edited.
This page will also display the total
available (Non-assigned) bandwidth, in percentage, can be assigned.
Page 65 / 95
63
Application
: A name that identifies an existing policy.
Time Schedule
: Scheduling your QOS policy to be applied.
Direction
: The traffic flow direction to be controlled by the QOS policy.
There are two settings to be provided in the Router:
~
LAN to WAN:
You want to control the traffic flow from the local network to the outside
world.
E.g., you have a FTP server inside the local network and you want to have a limited
traffic rate controlled by the QOS policy. So, you need to add a policy with LAN to WAN
direction setting.
~
LAN to WAN
: Control Traffic flow from the WAN to LAN.
The connection maybe either
issued from LAN to WAN or WAN to LAN.)
Assigned Bandwidth Ratio
: This field shows the assigned bandwidth ratio in
percentage for a QOS policy.
If WAN connection to internet is established, the estimated
transfer rate will be shown in kbps.
You may specify a fixed transfer rate or Minimum
Guaranteed Rate with priority for non-used bandwidth.
Non-Assigned Bandwidth Ratio
: This field shows the available bandwidth ratio, for LAN to
WAN and WAN to LAN, that has not yet assigned.
: Press this button to add a new QOS policy.
: Before using these buttons to edit or delete a policy, please select one policy
you want to edit/delete from the radio option
.
: After you have configured the policies, you can press this button to apply the

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top