Section 3 - Software Configuration

Step 2: In the second step, the user can configure the schedule settings for this rule.

The following parameters will be available for configuration:

Details: Select the appropriate predefined schedule rule to apply to this rule from the drop-down menu.

Step 3: In the third step, the user can configure the address type and IP address of the machines used in this rule.

The following parameters will be available for configuration:

Address Type: Specify a machine with its IP or MAC address, or select ‘Other Machines’ for machines that do not have a policy.

IP Address: After selecting the IP address type, the user can enter the IP address of the machines used in this rule here. Alternatively, the user can select a Computer from the Computer Name list.

Machine After selecting the MAC address type, the user Address: can enter the MAC address of the machine used in this rule here. Alternatively, the used can select a

Computer from the Computer Name list.

Add: Click on this button to add the machine to the list.

Update: After clicking the option, the user will be able to update the machine information. Delete: If the user chooses to remove a machine from the list, click on the icon.

Step 4: In the fourth step, the user can select the filtering method used for this rule.

The following parameters will be available for configuration:

Method: Here the user can select the filtering method used. Options to choose from are‘Log Web Access Only’, ‘Block All Access’, and ‘Block Some Access’.

D-Link DIR-645 User Manual

71

Page 75
Image 75
D-Link DIR-645 manual