Page 41 / 75 Scroll up to view Page 36 - 40
TL-R460
Cable/DSL Router User Guide
36
special-purpose service such as Internet gaming or videoconferencing. DMZ host
forwards all the ports at the same time. Any PC whose port is being forwarded must have
its DHCP client function disabled and should have a new static IP address assigned to it
because its IP address may change when using the DHCP function.
Figure 4-26
To assign a computer or server to be a DMZ server:
Step 1:
Click the
Enable
radio button
Step 2:
Enter the local host IP address in the
DMZ Host IP Address
field
Step 3:
Click the
Save
button.
)
Note:
After you set the DMZ host, the firewall related to the host will not take effect.
4.5.4 UPnP
Choose menu “
Forwarding
UPnP
”, you can view the information about UPnP on the
screen (shown in Figure 4-27). You can click
Refresh
to update the Current UPnP
Settings List before viewing the information.
The Universal Plug and Play (UPnP) feature allows the devices, such as Internet
computers, to access the local host resources or devices as needed. UPnP devices can
be automatically discovered by the UPnP service application on the LAN.
Figure 4-27
¾
Current UPnP Status -
If you want to use
the Router’s UPnP function, please click
Enabled
button. If you don’t want use the function, please click
Disable
button.
Page 42 / 75
TL-R460
Cable/DSL Router User Guide
37
Allowing the function may cause a risk to security, this feature is disabled by
default.
¾
App Description -
This displays the description provided by the application in the
UPnP request.
¾
External Port
-
This displays the external port, which the router opened for the
application.
¾
Protocol
-
This displays the protocol for the application.
¾
Internal Port
-
This displays the Internal port, which the router opened for local
host.
¾
IP Address
-
The UPnP device that is currently accessing the router.
¾
Status -
This displays the status.
Enabled
means that the port is still active,
Disabled
means that the port is inactive.
4.6
Security
Choose menu “
Security
”, you can see the submenus under the main menu:
Firewall
,
IP
Address Filtering
,
Domain Filtering
,
MAC Address Filtering
,
Remote Management
and
Advanced Security
.
Figure 4-28
Click any of them, and you will be able to configure the corresponding function. The
detailed explanations for each submenu are provided below.
4.6.1 Firewall
Choose menu “
Security
Firewall
”, you can control the general firewall switch on the
next screen (shown in Figure 4-29). The default setting for the switch is off, and the IP
Address Filtering, DNS Filtering and MAC Filtering are disabled, their settings are
ineffective in this situation.
Page 43 / 75
TL-R460
Cable/DSL Router User Guide
38
Figure 4-29
¾
Enable Firewall
-
Enable the general firewall switch or not.
¾
Enable IP Address Filtering
-
Enable the IP Address Filtering or not. There are two
default filtering rules, please select the rule for your need.
¾
Enable Domain Filtering
-
Enable the Domain Filtering or not. There are two
default filtering rules, please select the rule for your need.
¾
Enable MAC Address Filtering
-
Enable MAC Address Filtering or not. There are
two default filtering rules, please select the rule for your need.
4.6.2 IP Address Filtering
Choose menu “
Security
IP Address Filtering
”, you can configure the IP Address
filtering rule on the next screen (shown in Figure 4-30). The IP Address Filtering feature
allows you to control Internet Access by specific users on your LAN based on their IP
addresses.
Page 44 / 75
TL-R460
Cable/DSL Router User Guide
39
Figure 4-30
¾
Effective Time -
This is the time or the range of time for the entry to take effect. For
example, 1800 - 2200, it means that the entry will take effect from 18:00 to 22:00.
¾
LAN IP -
This is the LAN IP address or the range of LAN IP addresses in
dotted-decimal notation format. For example, 192.168.1.20 - 192.168.1.30. Keep
the field blank, which means all LAN IP addresses are controlled by the rule.
¾
LAN Port
-
This is the LAN Port or the range of LAN ports in the field. For example,
1030 - 2000. Keep the field blank, which means all LAN ports are controlled by the
rule.
¾
WAN IP
-
This is the WAN IP address or the range of WAN IP addresses in
dotted-decimal notation format. For example, 202.96.134.210 – 202.96.134.230.
Keep the field blank, which means all WAN IP addresses are controlled by the rule.
¾
WAN Port
-
This is the WAN Port or the range of WAN Ports. For example, 25 – 110.
Keep the field blank, which means all WAN Ports are controlled by the rule.
¾
Protocol
-
This indicates which protocol is used, either
TCP
,
UDP
, or
All
(all
protocols supported by the router).
¾
Action
-
This field displays the action that the Router takes to deal with the traffic.
Allow
means that the Router allows the traffic through the Router,
Deny
means
that
the Router rejects the traffic through the router.
¾
Status
-
This field displays the status of the rule.
Enabled
means the rule will take
effect,
Disabled
means the rule will not take effect.
To add/modify an IP Address filtering entry:
For example:
If you desire to block E-mail received and sent by the IP address
192.168.1.7 on your local network during the time of 1800 to 2200; And wish to make the
PCs with IP addresses 192.168.1.8 to 192.168.1.12 unable to visit the website of IP
address 202.96.134.12 all the day, while other PCs have no limit. You can configure the
rules as follows.
Page 45 / 75
TL-R460
Cable/DSL Router User Guide
40
Step 1:
Enable the “Firewall” and “IP Address Filtering” on the Firewall screen (show in
Figure 4-29), and then, you should select the Default IP Address Filtering Rule
"Allow the packets not specified by any filtering rules to pass through the
router".
Step 2:
Click
Add New…
/
Modify
shown in Figure 4-30, you will see a new screen
shown in Figure 4-31.
Step 3:
Enter the “Effective time” that the rule will take effect as shown in Figure 4-31.
Step 4:
Enter the “LAN IP Address”, “LAN Port”, “WAN IP Address” and “WAN Port” in
the corresponding field as shown in Figure 4-31.
Step 5:
Select the “Protocol”, “Action” and “Status” for the rule as shown on the next
screen.
Figure 4-31
Step 6:
Click the
Save
button to save this entry.
Step 7:
Go to
Step 2
to complete the other rules continually.
After you finish the configurations, you will see the rules in the table below:
Figure 4-32
)
Note:
Before adding an IP Address Filtering entry, you should enable the Firewall and the IP
Address Filtering function first (shown in Figure 4-29).
Other configurations for the entries as shown in Figure 4-30:
Click the
Delete
button to delete the entry.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top