User's Guide

© Copyright 2019 TRENDnet. All Rights Reserved.
32
TRENDnet User’s Guide
TWG-431BR
IM/P2P application filtering
Advanced > Access Control
You can deny access to a list of predefined IM/P2P applications outbound and filter by
MAC and/or IP address. You can check the current MAC addresses of devices connected
to your router under System > VLAN Setup > DHCP Server under the DHCP leases
section. You can also lock the IP address assigned to specific devices connected to your
router by adding static DHCP leases or reservations. The access control section can also
be used to filter other outbound traffic by IP address, URL/keyword filter, and IM/P2P
applications.
1. Log into your router management page (see “Access your router management page
on page 7).
2. Click on Advanced and click on Access Control.
3. Review the settings below.
Active Select Enable to enable the access control rule.
Comment Enter the name or description for the access control rule.
Protocol Click the drop-down list to select the protocol for the service to
filter: ANY, TCP, UDP, ICMP, Content Filter, Domain Filter, IP P2P, or IM. Select
IP P2P or IM to select from a list of predefined applications.
Schedule Allows you to select a schedule when the access control rule should
be enabled or disabled.
MAC Address Enter the MAC address you would like to filter or deny traffic
and click Add to add to the list. (e.g. a1:b2:c3:d4:e5:f6)
Note: You can filter by MAC address or IP address.
Local IP Address Enter the IP address range to apply the access control rule.
(ex.: 192.168.10.20 192.168.10.30)
Local Port Enter the source/local port. (Optional for IP P2P/IM)
Comment Enter the name or description for the access control rule.
Destination IP Address Enter the destination IP address range for the access
control rule. If left empty, this means any. (ex.: 10.10.10.20 10.10.10.30)
Destination Port Enter the destination port. (Optional for IP P2P/IM)
Interface Click the drop-down to select the local interface to apply the access
control rule.
IP/P2P or IM Setup Select from the list of predefined P2P/IM applications to
apply the access control rule.