Page 76 / 118 Scroll up to view Page 71 - 75
-72-
Figure 4-38 ARP List
The configurations for the entries is the same as the configuration of List of Scanning Result on
4.6.1.2
ARP Scanning
page.
The unbound IP-MAC information will be replaced by new IP-MAC information or be automatically
removed from the list if it has not been communicated with others for a long time. This period is
regarded as the aging time of the ARP information.
4.6.2 Attack Defense
With Attack Defense function enabled, the Router can distinguish the malicious packets and prevent
the port scanning from external network, so as to guarantee the network security.
Choose the menu
Firewall
Attack Defense
Attack Defense
to load the following page.
Page 77 / 118
-73-
Figure 4-39
Attack Defense
The following items are displayed on this screen:
¾
General
Flood Defense:
Flood attack is a kind of commonly used DoS (Denial of Service),
which including TCP SYN, UDP, ICMP and so on. It is
recommended to check all the Flood Defense options and specify
the corresponding thresholds. Keep the default settings if you are
not sure.
Page 78 / 118
-74-
Packet Anomaly
Defense:
Packet
Anomaly
refers
to
the
abnormal
packets.
It
is
recommended to select all the Packet Anomaly Defense options.
Enable Attack
Defense Logs:
With this box checked, the Router will record the defense logs.
4.6.3
MAC Filtering
On this page, you can control the access to the Internet of local host by specifying their MAC
addresses.
Choose the menu
Firewall
MAC Filtering
MAC Filtering
to load the following page.
Figure 4-40 MAC Filtering
The following items are displayed on this screen:
¾
General
To control the access to Internet for hosts in you private network, it is recommended to check the
box before
Enable MAC Filtering
and select a filtering mode according to actual situation.
¾
MAC Filtering
MAC Address:
Enter the MAC Address to be filtered.
Description:
Give a description for the entry.
Page 79 / 118
-75-
¾
List of Rules
You can view the information of the entries and edit them by the Action buttons.
4.6.4 Access Control
4.6.4.1
URL Filtering
URL (Uniform Resource Locator) specifies where an identified resource is available and the
mechanism for retrieving it. URL Filter functions to filter the Internet URL address, so as to provide a
convenient way for controlling the access to Internet from LAN hosts.
Choose the menu
Firewall
Access Control
URL Filtering
to load the following page.
Figure 4-41 URL Filtering
The following items are displayed on this screen:
¾
General
To control the access to Internet for hosts in your private network, you are recommended to
check the box before
Enable URL Filtering
and select a filtering rule based on the actual
situation.
¾
URL Filtering Rule
Object:
Select the range in which the URL Filtering takes effect:
z
ANY: URL Filtering will take effect to all the users.
Page 80 / 118
z
Group: URL Filtering will take effect to all the users in group.
Mode:
Select the mode for URL Filtering. “Keyword’’ indicates that all the
URL addresses including the specified keywords will be filtered.
“URL Path” indicates that the URL address will be filtered only
when it exactly matches the specified URL.
Description:
Give a description for the entry.
¾
List of Rules
You can view the information of the entries and edit them by the Action buttons.
Application Example:
Network Requirements:
Prevent the local hosts from accessing Internet website www.aabbcc.com and downloading the files
with suffix of “exe”.
Configuration Procedure:
Select Keywords mode and type ”exe“ in the field, select URL mode and type “www.aabbcc.com” as
the following figure shows, and then click the <Add> button to make the setting take effect.
-76-

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top