Cisco WRP400-G1 Administration Guide - Page 140

Access Restrictions, Access Restrictions > Internet Access

Page 140 highlights

Data Fields Access Restrictions B Access Restrictions The Access Restrictions module includes the following pages: • "Access Restrictions > Internet Access" on page 138 Access Restrictions > Internet Access Enter Policy Name Status Applied PCs A name for the policy Policies are disabled by default. To enable the selected policy, select Enabled. The computers that will be affected by the policy that you selected in the Access Policy list. • MAC Address: The MAC address of the device. • IP Address: The final octet of the IP address. Access Restriction • IP Address Range: A range of devices, identfied by the final octet of the starting IP address and the final octect of the ending IP address. Deny: Prevent the listed computers from accessing the Internet. Allow: Permit the listed computers to access the Internet. Schedule The days and times when the policy is enforced. The Everyday option applies the policy to all days of the week, or you can specify the days. The 24 Hours option applies the policy to all hours of the specified days, or you can speciy the time range. Website Blocking by URL Address A list of website addresses that users are prevented from accessing. Website Blocking by Keyword A list of keywords that are used to prevent access to inappropriate websites. Blocked Applications A list of applications, such as FTP, that users are prevented from using. Up to three applications can be blocked for each policy. Cisco Small Business WRP400 Administration Guide 138

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173

Data Fields
Access Restrictions
Cisco Small Business WRP400 Administration Guide
138
B
Access Restrictions
The Access Restrictions module includes the following pages:
“Access Restrictions > Internet Access” on page 138
Access Restrictions > Internet Access
Enter Policy Name
A name for the policy
Status
Policies are disabled by default. To enable the
selected policy, select
Enabled
.
Applied PCs
The computers that will be affected by the
policy that you selected in the Access Policy
list.
MAC Address: The MAC address of the
device.
IP Address: The final octet of the IP address.
IP Address Range: A range of devices,
identfied by the final octet of the starting IP
address and the final octect of the ending IP
address.
Access Restriction
Deny: Prevent the listed computers from
accessing the Internet.
Allow: Permit the listed computers to access the
Internet.
Schedule
The days and times when the policy is enforced.
The Everyday option applies the policy to all
days of the week, or you can specify the days.
The 24 Hours option applies the policy to all
hours of the specified days, or you can speciy
the time range.
Website Blocking by URL
Address
A list of website addresses that users are
prevented from accessing.
Website Blocking by Keyword
A list of keywords that are used to prevent
access to inappropriate websites.
Blocked Applications
A list of applications, such as FTP, that users are
prevented from using. Up to three applications
can be blocked for each policy.