Using the Web-Based Advanced User Interface
Table of Contents | sections | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
The third configuration for the Access Control list is the “URL List” for the URL addresses that are to be blocked or allowed.. Users can choose to “Block All URLs”, “Allow All URLs”, or configure their own list of URLs..
The fourth configuration for the Access Control list is the “URL Keyword List” for the URL address keywords that are to be blocked or allowed.. The default value is blank for this list and the user can configure a list of URL address keywords..
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall.. This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application.. Use this feature on a temporary basis.. The computer in the DMZ is NOT protected from hacker attacks..
N+ Wireless Modem Router | 52 |