TP-Link TL-R600VPN TL-R600VPN V1 User Guide - Page 45

Disable All

Page 45 highlights

TL-R600VPN SafeStreamTM Gigabit Broadband VPN Router User Guide Step 3: Click the Save button. Figure 4-30 Other configurations for the entries as shown in Figure 4-29: Click the Delete button to delete the entry. Click the Enable All button to enable all the entries. Click the Disable All button to disable all the entries. Click the Delete All button to delete all the entries. Click the Previous button to view the information in the previous screen, click the Next button to view the information in the next screen. 4.7.2 Host Choose menu "Access Control →Host", you can configure Host of the Access Control rule in the next screen (shown in Figure 4-31). Figure 4-31 ¾ Host Description: Displays the description of the host and the description is unique. ¾ Information: Displays the MAC address or IP address of the PCs to which the rule take effect. To add/modify a host for Access Control Rule: Step 1: Click Add New.../Edit shown in Figure 4-31, you will see a new screen shown in Figure 4-32. 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

TL-R600VPN
SafeStream
Gigabit Broadband VPN Router User Guide
TM
39
Figure 4-30
Step 3:
Click the
Save
button.
Other configurations for the entries as shown in Figure 4-29:
Click the
Delete
button to delete the entry.
Click the
Enable All
button to enable all the entries.
Click the
Disable All
button to disable all the entries.
Click the
Delete All
button to delete all the entries.
Click the
Previous
button to view the information in the previous screen,
click the
Next
button to
view the information in the next screen.
4.7.2
Host
Choose menu “
Access Control
Host
”, you can configure Host of the Access Control rule in
the next screen (shown in Figure 4-31).
Figure 4-31
¾
Host Description:
Displays the description of the host and the description is unique.
¾
Information:
Displays the MAC address or IP address of the PCs to which the rule take
effect.
To add/modify a host for Access Control Rule:
Step 1:
Click
Add New…
/
Edit
shown in Figure 4-31, you will see a new screen shown in Figure
4-32.