D-Link DIR-645 Product Manual - Page 76

Step 2, Step 3, Step 4, Log Web Access Only, lock All Access, Block Some Access

Page 76 highlights

Section 3 - Software Configuration Step 2: In the second step, the user can configure the schedule settings for this rule. The following parameters will be available for configuration: Details: Select the appropriate predefined schedule rule to apply to this rule from the drop-down menu. Step 3: In the third step, the user can configure the address type and IP address of the machines used in this rule. The following parameters will be available for configuration: Address Type: Specify a machine with its IP or MAC address, or select 'Other Machines' for machines that do not have a policy. IP Address: After selecting the IP address type, the user can enter the IP address of the machines used in this rule here. Alternatively, the user can select a Computer from the Computer Name list. Machine After selecting the MAC address type, the user Address: can enter the MAC address of the machine used in this rule here. Alternatively, the used can select a Computer from the Computer Name list. Add: Click on this button to add the machine to the list. Update: After clicking the option, the user will be able to update the machine information. Delete: If the user chooses to remove a machine from the list, click on the icon. Step 4: In the fourth step, the user can select the filtering method used for this rule. The following parameters will be available for configuration: Method: Here the user can select the filtering method used. Options to choose from are 'Log Web Access Only', 'Block All Access', and 'Block Some Access'. D-Link DIR-645 User Manual 72

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139

72
D-Link DIR-645 User Manual
Section 3 - Software Configuration
Step 2:
In the second step, the user can configure the schedule settings
for this rule.
The following parameters will be available for configuration:
Details:
Select the appropriate predefined schedule rule
to apply to this rule from the drop-down menu.
Step 3:
In the third step, the user can configure the address type and IP
address of the machines used in this rule.
The following parameters will be available for configuration:
Address Type:
Specify a machine with its IP or MAC address, or
select ‘Other Machines’ for machines that do not
have a policy.
IP Address:
After selecting the IP address type, the user can
enter the IP address of the machines used in
this rule here. Alternatively, the user can select a
Computer from the Computer Name list.
Machine
Address:
After selecting the MAC address type, the user
can enter the MAC address of the machine used in
this rule here. Alternatively, the used can select a
Computer from the Computer Name list.
Add:
Click on this button to add the machine to the list.
Update:
After clicking the
option, the user will be able to update the machine information.
Delete:
If the user chooses to remove a machine from the list, click on the
icon.
Step 4:
In the fourth step, the user can select the filtering method used
for this rule.
The following parameters will be available for configuration:
Method:
Here the user can select the filtering method used.
Options to choose from are ‘
Log Web Access Only
’,
‘B
lock All Access
’, and ‘
Block Some Access
’.