User's Manual

Packet Filtering Page
Packet Filtering allows you to control what packets are allowed to pass through the
Modem/Router. Outbound Packet filters control outbound packets and Inbound
Filtering controls packets coming from the Internet. Inbound Filters applies only to
packets going to a Virtual Server or DMZ. Most users will not need to setup Packet
Filtering.
When you click on Packet Filters from the left-side menu, it takes you to the
Outbound Packet Filtering page. If you need to set up an Inbound Filter, click on
Inbound Filter button at the bottom of the page.
Filtering Policies
You can select one of the two filtering policies:
Allow all to pass except those that match the specified rules
Deny all to pass except those that match the specified rules
Filtering Rules
You can specify eight rules for each direction: inbound or outbound. For each rule,
you can define the following:
Source IP address
Destination IP address
Destination Port
Use Rule#
For the Source or Destination IP address, you can define a single IP address (4.3.2.1).
An empty field implies any IP address.
For Destination Port, you can define a single port (80) or a range of ports (1000-1999).
No prefix indicates both TCP and UDP are defined. Leaving this empty implies that all
port addresses apply.
Each Rule can be enabled or disabled individually.
You can use packet filters with scheduling rules for more access control flexibility.
The Domain Filters Page
You can use the Domain Filters page to enable or deny user access to specified URLs.
Domain filtering and URL Blocking perform similar functions. The major difference
between Domain Filtering and URL Blocking is that Domain Filtering requires the user
to input a suffix whereas URL Blocking requires the user to input a keyword only. In
other words, Domain Filtering can block a specific web site, whereas URL Blocking
can block hundreds of web sites by specifying a keyword.
Domain Filter
Use to prevent users behind this device from accessing specific URLs.
Log attempted URL Access
Check if you want to log the action when someone accesses the specific