Page 116 / 236 Scroll up to view Page 111 - 115
Chapter 15 Firewall
EMG2926-Q10A User’s Guide
116
Figure 69
Security > Firewall > Services l
The following table describes the labels in this screen.
Table 46
Security > Firewall > Services
LABEL
DESCRIPTION
LABEL
DESCRIPTION
ICMP
Internet Control Message Protocol is a message control and error-reporting protocol
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the TCP/IP software and directly apparent
to the application user.
Respond to Ping
on
The EMG2926-Q10A will not respond to any incoming Ping requests when
Disable
is
selected. Select
LAN
to reply to incoming LAN Ping requests. Select
WAN
to reply to
incoming WAN Ping requests. Otherwise select
LAN&WAN
to reply to all incoming LAN
and WAN Ping requests.
Apply
Click
Apply
to save the settings.
Enable Firewall Rule
Enable Firewall
Rule
Select this check box to activate the firewall rules that you define (see
Add Firewall Rule
below).
Apply
Click
Apply
to save the settings.
Add Firewall Rule
Service Name
Enter a name that identifies or describes the firewall rule.
MAC Address
Enter the MAC address of the computer for which the firewall rule applies.
Dest IP Address
Enter the IP address of the computer to which traffic for the application or service is
entering.
The EMG2926-Q10A applies the firewall rule to traffic initiating from this computer.
Page 117 / 236
Chapter 15 Firewall
EMG2926-Q10A User’s Guide
117
See
Appendix C on page 219
for commonly used services and port numbers.
Source IP Address
Enter the IP address of the computer that initializes traffic for the application or service.
The EMG2926-Q10A applies the firewall rule to traffic initiating from this computer.
Protocol
Select the protocol (
TCP
,
UDP
or
ICMP
) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range
Enter the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
Enter the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Add Rule
Click
Add
to save the firewall rule.
Firewall Rule
#
This is your firewall rule number. The ordering of your rules is important as rules are
applied in turn.
Service Name
This is a name that identifies or describes the firewall rule.
MAC address
This is the MAC address of the computer for which the firewall rule applies.
Dest IP
This is the IP address of the computer to which traffic for the application or service is
entering.
Source IP
This is the IP address of the computer from which traffic for the application or service is
initialized.
Protocol
This is the protocol (
TCP
,
UDP
or
ICMP
) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range
This is the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
This is the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Action
DROP
- Traffic matching the conditions of the firewall rule are stopped.
Delete
Click
Delete
to remove the firewall rule.
Cancel
Click
Cancel
to start configuring this screen again.
Table 46
Security > Firewall > Services (continued)
LABEL
DESCRIPTION
Page 118 / 236
EMG2926-Q10A User’s Guide
118
C
HAPTER
16
Content Filtering
16.1
Overview
This chapter shows you how to configure content filtering. Content filtering is the ability to block
certain web features.
16.2
Content Filter
Use this screen to restrict web features, and designate a trusted computer. Click
Security
>
Content Filter
to open the
Content Filter
screen.
Figure 70
Security > Content Filter
The following table describes the labels in this screen.
Table 47
Security > Content Filter
LABEL
DESCRIPTION
Trusted IP Setup
To enable this feature, type an IP address of any one of the computers in your network
that you want to have as a trusted computer. This allows the trusted computer to have
full access to all features that are configured to be blocked by content filtering.
Leave this field blank to have no trusted computers.
Restrict Web
Features
Select the box(es) to restrict a feature. When you download a page containing a
restricted feature, that part of the web page will appear blank or grayed out.
ActiveX
A tool for building dynamic and active Web pages and distributed object applications.
When you visit an ActiveX Web site, ActiveX controls are downloaded to your browser,
where they remain in case you visit the site again.
Java
A programming language and development environment for building downloadable Web
components or Internet and intranet business applications of all kinds.
Cookies
Used by Web servers to track usage and provide service based on ID.
Page 119 / 236
Chapter 16 Content Filtering
EMG2926-Q10A User’s Guide
119
Web Proxy
A server that acts as an intermediary between a user and the Internet to provide
security, administrative control, and caching service. When a proxy server is located on
the WAN it is possible for LAN users to circumvent content filtering by pointing to this
proxy server.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to begin configuring this screen afresh
Table 47
Security > Content Filter
(continued)
LABEL
DESCRIPTION
Page 120 / 236
EMG2926-Q10A User’s Guide
120
C
HAPTER
17
Parental Control
17.1
Overview
Parental controls allow you to block specific URLs. You can also define time periods and days during
which the EMG2926-Q10A performs parental control on a specific user.
17.1.1
What You Need To Know
The following terms and concepts may help as you read through this chapter.
Keyword Blocking URL Checking
The EMG2926-Q10A checks the URL’s domain name (or IP address) and file path separately when
performing keyword blocking.
The URL’s domain name or IP address is the characters that come before the first slash in the URL.
For example, with the URL
www.zyxel.com.tw/news/pressroom.php
, the domain name is
www.zyxel.com.tw
.
The file path is the characters that come after the first slash in the URL. For example, with the URL
www.zyxel.com.tw/news/pressroom.php
, the file path is
news/pressroom.php
.
Since the EMG2926-Q10A checks the URL’s domain name (or IP address) and file path separately, it
will not find items that go across the two. For example, with the URL
www.zyxel.com.tw/news/
pressroom.php
, the EMG2926-Q10A would find “tw” in the domain name (
www.zyxel.com.tw)
. It
would also find “news” in the file path (
news/pressroom.php
) but it would not find “tw/news”.
17.2
Parental Control Screen
Use this screen to enable parental control, view the parental control rules and schedules.
Click
Configuration > Security
>
Parental Control
to open the following screen.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top