TP-Link TL-ER604W manual App Control,  Control Rules, Application

Page 93

3.5.5App Control

3.5.5.1Control Rules

On this page, you can enable the Application Rules function.

Choose the menu Firewall→App Control→Control Rules to load the following page.

Figure 3-59 Application Rules

The following items are displayed on this screen:

General

Check the box before Enable Application Control to make the Application Control function take effect. The specified application used by the specified local users will be not allowed to access the Internet if the Application Control entry is enabled.

Control Rules

Object:

Specify the object for the entry. You can select “Group” to limit the

 

predefined group, or select “ANY” to limit all the users.

Group:

If select “Group” as object, you can select the group in the drop-down list.

 

To establish new group, please refer to 3.3.1 Group.

Application:

Click the <Application List> button to select applications from the popup

 

checkbox. The applications include IM, Web IM, SNS, P2P, Media, Basic

 

-88-

Image 93
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Application 130 Hardware Specifications 148149 Glossary 151Package Contents Intended Readers Symbol DescriptionConventions Overview of this GuideOverview of the Router Features Wireless Traffic ControlSecurity Front Panel Appearance LEDs Status IndicationRear Panel System Mode NetworkStatus Page  NAT Mode WAN Mode Non-NAT Mode  Classic Mode3.2 WAN1  WAN ModeTips Static IP Static IP WAN Static IP Following items are displayed on this screen Dynamic IP Dynamic IPConnection Type Host NameUnicast Get IP Address byUse the following DNS ServerWAN PPPoE PPPoEActive Mode PasswordSettings Keep Alive Account NameISP Address Service NameSecondary Connection Subnet AddressL2TP Gateway Address10 WAN L2TP Following items are displayed on this screen  L2TP SettingsDefault Gateway SecondaryConnection Pptp  L2TP StatusServer IP  Pptp SettingsInternet connection by the Connect or Disconnect BigPond  Pptp Status12 WAN Bigpond Following items are displayed on this screen  BigPond SettingsISP  BigPond Status4 LAN 4.1 LANDhcp  Dhcp Settings Dhcp Client Dhcp Reservation Dhcp Reservation  List of Reserved Address MAC AddressSet the MAC Address for LAN port Set the MAC Address for WAN portStatistics Switch MAC Address Port Statistics Port MirrorMode Enable Port MirrorMirroring Port Mirrored PortRate Control Application Example Rate Control  Port Config Port ConfigPort Status Port Vlan Port Vlan Wireless Setting WirelessWireless Setting  Wireless Setting Wireless Parameter Ssid Broadcast DescriptionAP Isolation SecurityWPA/WPA2 WEP Multi-SSID Key FormatHexadecimal and Ascii formats are  General  Multi-SSID ConfigGuest Network Enable/DisableGroup Key EncryptionAuth Type  List of Group 1.3 WDS Parameter ScanBSSIDto be bridged Key Type Wireless Advanced Wireless AdvancedKey : Short GIMAC Filtering Host Status  Filtering Rules Rule List User Group Group Host Status  Group Config  User ConfigUser View  View Config List of User ViewNAT Setup Advanced1 NAT  One-to-One NAT One-to-One NATMulti-Nets NAT  List of Rules Multi-Nets NAT Application Example Network Requirements Configuration procedureVirtual Server  Virtual Server InterfaceProtocol  Port Triggering Port Triggering38 ALG Following items are displayed on this screen 1.6 ALGTraffic Control Setup323 ALG IPsec ALGControl all the time ControlLimited UpstreamBandwidth Control Session Limit Session LimitLimited Bandwidth  List of Session Limit Session ListConfiguration Load BalancePolicy Routing WAN 45 Link Backup Following items are displayed on this screen Link BackupProtocol WAN ConfigTiming FailoverStatic Route Routing Protocol  List of Protocol Static Route 47 Static Route Following items are displayed on this screen5.2 RIP  List of RIP 48 RIP Following items are displayed on this screenRoute Table Firewall Anti ARP SpoofingIP-MAC Binding  IP-MAC Binding ARP ScanningARP List Attack Defense Flood Defense Enable AttackPacket Anomaly DefenseMAC Filtering Access ControlURL Filtering  MAC FilteringObject  URL Filtering RuleWeb Filtering Access RulesService  Access RulesPolicy SourceGroup on 3.3.1 Group ServiceDestination Priority List of Service  ServiceName Dest. PortControl Rules App Control Control Rules ApplicationDatabase VPNIKE Policy 1 IKE IKE Policy 62 IKE Policy Following items are displayed on this screenIKE Proposal  IKE Proposal 63 IKE Proposal Following items are displayed on this screenIPsec IPsec Policy List of IKE Proposal  IPsec Policy Policy NameLocal Subnet Remote Subnet Policy ModeRemote Gateway IKE PolicyESP Authentication Key-In AH Authentication Key-InAH Authentication Key-Out ESP Authentication Key-OutIPsec Proposal  List of IPsec Policy IPsec IPsec Proposal  List of IPsec Proposal Protocol Media Tunnel Length of Header Authentication 3 L2TP/PPTPIPsec SA  L2TP/PPTP Tunnel 3.1 L2TP/PPTP TunnelMax Connections TunnelL2TP/PPTP Server Pre-shard KeyIP Address Pool  List of ConfigurationsList of L2TP/PPTP Tunnel  IP Address PoolServices PPPoE ServerGeneral 70 General Following items are displayed on this screen IP Address Pool  Account AccountIP Address Assigned Static IP AddressIs 48. If Enable Advanced Account Features is not selected, Exceptional IP List of Account Bulletin List of Account Exceptional IP Interval  E-BulletinTitle Dynamic DNS Publisher List of E-Bulletin  Dyndns Ddns DynDNSNo-IP  List of DynDNS Account No-IP Ddns PeanutHull  List of No-IP Account PeanutHull Ddns  List of PeanutHull Account ComexeUPnP  Comexe Ddns List of Comexe Account Admin Setup MaintenanceAdministrator  List of UPnP Mapping Administrator Login Parameter Remote Management Remote ManagementFactory Defaults Management List of Subnet  Configuration Version RebootExport and Import  ExportLicense Firmware UpgradeInterface Traffic Statistics Statistics Interface Traffic Statistics 123 Advanced WAN Information IP Traffic StatisticsDiagnostics Diagnostics Traffic Statistics  IP Traffic StatisticsOnline Detection  Ping Tracert Ping TimeDNS Lookup Port Displays the detected WAN port DetectionLogs  List of Logs  ConfigSeverity Send System LogsNetwork Requirements ApplicationNetwork Topology Configurations Internet SettingSystem Mode Internet Connection System ModeIKE Setting VPN SettingSettings IPsec VPNIKE1  IKE Policy IPsec Proposal IPsec SettingPFS DH1  IPsec Policy IP Address Pool Pptp VPN Setting L2TP/PPTP Tunnel User Group Network Management Group  User View App Control11 App Rules Enable Bandwidth ControlLAN WAN1 Bandwidth Control RuleNetwork Security LAN ARP DefenseScan and import the entries to ARP List WAN ARP Defense Set IP-MAC Binding Entry ManuallySet Attack Defense 20 Attack Defense 145 Attack DefenseStatistics Traffic MonitoringPage Environmental and Physical Appendix a Hardware SpecificationsAppendix B FAQ Page Glossary Description Appendix C GlossaryAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb