48
N Wireless Router
sectionstable of contents 12345 789106
UsINg THe Web-based adVaNCed UseR INTeRfaCe
To restrict Internet access to a single computer for example, enter the
IP address of the compu ter you wish to re strict access to in the IP fields
(1). Next, enter “80” in both the port fields (2). Select “Both” (3). Select
“Block” (4). You can also sele ct “Always” to block ac cess all of the time.
Select the day to start on top (5), the time to start on top (6), the day to
end on the bottom (7), and the time to stop (8) on the bottom. Select
“Enable” (9). Click “Apply Changes”. The computer at the IP address
you specified will now be blocked from Internet access at th e times you
specified. Note: Be sure you have selected the correct time zone under
“Utilities> System Settings> Time Zone”.
(1) (2) (3) (4) (7) (8) (9)
(5) (6)
enabling the demilitarized Zone (dMZ)
The DMZ feature allows you to specify one computer on your n etwork
to be placed outside of the firewall. This may be necessar y if the firewall
is causing problems wi th an application such as a game o r video
conferencing applicati on. Use this featu re on a temporar y basis. The
computer in the DMZ is N oT protected from hacker attacks.
To put a computer in the DMZ , enter the last d igits of its IP add ress in
the IP field and selec t “Enable”. Click “Apply C hanges” for the ch ange
to take effect. If you a re using multiple static WAN IP addre sses, it is
possible to select whi ch WAN IP address the DMZ host will b e directed
to. Type in the WAN IP address yo u wish the DMZ hos t to direct to, ente r
the last two digits of t he IP address of the DMZ host compu ter, select
“Enable” and click “Apply C hanges”.