|
Otros manuales para este modelo:
Resumen del manual
Select the option you want: •Any. All Internet IP addresses are covered by this choice. •Address range. You have to fill in the Start and End fields when this option is selected. •Single address. Enter the required address in the Start field. e.Log. This setting determines whether traffic covered by this rule is logged. Select the action you want: •Always. This choice always logs traffic that is covered by this rule, whether it matches or not. (This feature is useful when you are debugging your rules.) •Never. This choice never logs traffic covered by this rule, whether it matches or not. f.Click Apply to have your changes take effect, or click Cancel to return to the previous screen. 3.Inbound Services. To allow or block an inbound service, click here to set up inbound firewall rules for gaming or other applications. You are redirected to the Port Forwarding/Port Triggering screen as described in Port Forwarding and Triggering on page 102. 4.Click Apply to enable your Firewall Rules selections. Add Custom Services to Allow or Block You can define your own incoming and outgoing custom services to allow or block. Once you add your own custom services, they are available on the Outbound Services screen (as described in Firewall Rules on page 78) and the Inbound Services screen (as described in Port Forwarding and Triggering on page 102). 1.Click Add Custom Service to add a service. The Add Service screen displays: The Add Service screen allows you to specify or edit your own custom service definition. You can then use the custom service when creating firewall rules. 2.To add a service for blocking, first determine which port number or range of numbers is used by the application. 3.In the Name field, enter a suitable name for this service. 4.In the Type list, select the correct type for this service (if in doubt, select TCP/UDP): •TCP •UDP •TCP/UDP 5.Enter the starting and ending port numbers. If the application uses a single port number, enter that number in both fields. 6.Click Apply to save your information and return to the previous screen. You can specify the days and time that you want to block Internet access. 1.Select ADVANCED > Security > Schedule to display the following screen: 2.Set up the schedule for blocking keywords and services. •Days to Block. Select days on which you want to apply blocking by selecting the appropriate check boxes, or select Every Day to select the check boxes for all days. •Time of Day to Block. Select a start and end time in 24-hour format, or select All Day for 24-hour blocking. 3.Select your time zone from the list. If you use daylight saving time, select the Automatically adjust for daylight savings time check box. 4.Click Apply to save your settings. To receive logs and alerts by email, provide your email information in the E-mail screen and specify which alerts you want to receive and how often. 1.Select ADVANCED > Security > E-mail to display the following screen: 2.To receive email logs and alerts from the WiFi DSL modem router, select the Turn E-mail Notification On check box. 3.In the Your Outgoing Mail Server field, enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You might be able to find this information in the configuration screen of your email program. If you leave this field blank, log and alert messages are not sent by email. 4.In the Send to This Email Address field, enter the email address to which logs and alerts are sent. This email address is also used for the From address. If you leave this field blank, log and alert messages are not sent by email. 5.If your outgoing email server requires authentication, select the My Mail Server requires authentication check box. Fill in the User Name and Password fields for the outgoing email server. 6.You can have email alerts sent immediately when someone attempts to visit a blocked site, and you can specify that logs are sent automatically. If you select the Weekly, Daily, or Hourly option and the log fills up before the specified period, the log is automatically emailed to the specified email address. After the log is sent, the log is cleared from the WiFi DSL modem router’s memory. If the WiFi DSL modem router cannot email the log file, the log buffer might fill up. In this case, the WiFi DSL modem router overwrites the log and discards its contents. 7.Click Apply to save your settings. 8. Administration Manage your network This chapter describes the settings for administering and maintaining your WiFi DSL modem router and home network. See also Remote Management on page 115 for information about upgrading or checking the status of your WiFi DSL modem router over the Internet, and Traffic Meter on page 118 for information about monitoring the volume of Internet traffic passing through your WiFi DSL modem router’s Internet port. This chapter includes the following sections: •Upgrade the WiFi DSL Modem Router Firmware •View WiFi DSL Modem Router Status •View Logs of Web Access or ...