Page 56 / 123 Scroll up to view Page 51 - 55
Security Configuration
53
Figure 35: Password Dialog
Enter the "User Name" and "Password" you set on the
Admin Login
screen above.
Page 57 / 123
TW100-BRV204 User Guide
54
Access Control
This feature is accessed by the
Access Control
link on the Security menu.
The Access Control feature allows administrators to restrict the level of Internet Access avail-
able to PCs on your LAN. With the default settings, everyone has unrestricted Internet access.
To use this feature:
1.
Set the desired restrictions on the "Default" group. All PCs are in the "Default" group
unless explicitly moved to another group.
2.
Set the desired restrictions on the other groups ("Group 1", "Group 2", "Group 3" and
"Group 4") as needed.
3.
Assign PC to the groups as required.
Access Control Screen
To view this screen, select the
Access Control
link on the Security menu.
Figure 36: Access Control Screen
Data - Access Control Screen
Group
Select the desired Group. The screen will update to display the
settings for the selected Group. Groups are named "Default",
"Group 1", "Group 2", "Group 3" and "Group 4", and cannot be re-
named.
Page 58 / 123
Security Configuration
55
"Members" Button
Click this button to add or remove members from the current
Group.
If the current group is "Default", then members can not be
added or deleted. This group contains PCs not allocated to any
other group.
To remove PCs from the Default Group, assign them to an-
other Group.
To assign PCs to the Default Group, delete them from the
Group they are currently in.
See the following section for details of the
Group Members
screen.
Restrictions
Select the desired options for the current group:
None - Nothing is blocked. Use this to create the least restric-
tive group.
Block all Internet access - All traffic via the WAN port is
blocked. Use this to create the most restrictive group.
Block selected Services - You can select which Services are to
block. Use this to gain fine control over the Internet access for
a group.
Block by Schedule
If Internet access is being blocked, you can choose to apply the
blocking only during scheduled times. (If access is not blocked, no
Scheduling is possible, and this setting has no effect.)
Services
This lists all defined Services. Select the Services you wish to
block. To select multiple services, hold the CTRL key while
selecting. (On the Macintosh, hold the SHIFT key rather than
CTRL.)
Members
Click this button to add or remove members from the current
Group.
If the current group is "Default", then members can not be added or
deleted. This group contains PCs not allocated to any other group.
See the following section for details of the
Group Members
screen.
Save
Save the data on screen.
Cancel
Reverse any changes made since the last "Save".
View Log
Click this to open a sub-window where you can view the "Access
Control" log. This log shows attempted Internet accesses which
have been blocked by the Access Control feature.
Clear Log
Click this to clear and restart the "Access Control" log, making new
entries easier to read.
Page 59 / 123
TW100-BRV204 User Guide
56
Group Members Screen
This screen is displayed when the
Members
button on the
Access Control
screen is clicked.
Figure 37: Group Members
Use this screen to add or remove members (PCs) from the current group.
The "Del >>" button will remove the selected PC (in the
Members
list) from the current
group.
The "<< Add" button will add the selected PC (in the
Other PCs
list) to the current group.
Access Control Log
To check the operation of the Access Control feature, an
Access Control Log
is provided.
Click the
View Log
button on the
Access Control
screen to view this log.
This log shows attempted Internet accesses which have been
blocked
by the
Access Control
function.
Data shown in this log is as follows:
Date/Time
Date and Time of the attempted access.
Name
If known, the name of the PC whose access was blocked. This
name is taken from the
Network Clients
database
Source IP address
The IP Address of the PC or device whose access request was
blocked
MAC address
The hardware or physical address of the PC or device whose access
request was blocked
Destination
The destination URL or IP address
Page 60 / 123
Security Configuration
57
Firewall Rules
For normal operation and LAN protection, it is not necessary to use this screen.
The Firewall will always block DoS (Denial of Service) attacks. A DoS attack does not attempt
to steal data or damage your PCs, but overloads your Internet connection so you can not use it
- the service is unavailable.
As well, you can use this screen to create Firewall rules to block or allow specific traffic. But
Incorrect configuration may cause serious problems.
This feature is for advanced administrators only!
Firewall Rules Screen
Click the
Firewall Rules
option on the Security menu to see a screen like the following exam-
ple. This example contains two (2) rules for outgoing traffic.
Figure 38: Firewall Rules Screen
Data - Firewall Rules Screen
View Rules for ..
Select the desired option; the screen will update and list any current
rules. If you have not defined any rules, the list will be empty.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top