Netgear DG834G DG834Gv4 Reference Manual - Page 42

Firewall Rules, Per Schedule, Always, Keyword, Add Keyword, Apply, Delete Keyword, Trusted IP Address

Page 42 highlights

ADSL2+ Modem Wireless Router DG834G Reference Manual 3. To enable keyword blocking, select one of the following: • Per Schedule. Turn on keyword blocking according to the settings on the Schedule screen. • Always. Turn on keyword blocking all the time, independent of the setting in the Schedule screen. 4. Enter a keyword or domain in the Keyword field, click Add Keyword, and then click Apply. Some examples of keyword applications are shown in the following chart. Keyword XXX .com . ( a period) Result Block the URL http://www.badstuf.com/xxx.html. Only websites with other domain suffixes (such as .edu or .gov) can be viewed. Block all Internet browsing access. Up to 32 entries are supported in the Keyword list. 5. To delete a keyword or domain, select it from the list, click Delete Keyword, and then click Apply. 6. To specify a trusted user, enter that computer's IP address in the Trusted IP Address field, and then click Apply. You can specify one trusted user, which is a computer that will be exempt from blocking and logging. Since the trusted user will be identified by an IP address, you should configure that computer with a fixed IP address. 7. Click Apply to save your settings. Firewall Rules Firewall rules block or allow specific traffic passing through from one side of the router to the other. Inbound rules (WAN to LAN) restrict access by outsiders to private resources, selectively allowing only specific outside users to access specific resources. Outbound rules (LAN to WAN) determine what outside resources local users can have access to. The default inbound and outbound rules of the modem router are: • Inbound. Block all access from outside except responses to requests from the LAN side. • Outbound. Allow all access from the LAN side to the outside. 3-4 Protecting Your Network v2.0, September 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

ADSL2+ Modem Wireless Router DG834G Reference Manual
3-4
Protecting Your Network
v2.0, September 2007
3.
To enable keyword blocking, select one of the following:
Per Schedule
. Turn on keyword blocking according to the settings on the Schedule
screen.
Always
. Turn on keyword blocking all the time, independent of the setting in the Schedule
screen.
4.
Enter a keyword or domain in the
Keyword
field, click
Add Keyword
, and then click
Apply
.
Some examples of keyword applications are shown in the following chart.
Up to 32 entries are supported in the Keyword list.
5.
To delete a keyword or domain, select it from the list, click
Delete Keyword
, and then click
Apply
.
6.
To specify a trusted user, enter that computer’s IP address in the
Trusted IP Address
field,
and then click
Apply
.
You can specify one trusted user, which is a computer that will be exempt from blocking and
logging. Since the trusted user will be identified by an IP address, you should configure that
computer with a fixed IP address.
7.
Click
Apply
to save your settings.
Firewall Rules
Firewall rules block or allow specific traffic passing through from one side of the router to the
other. Inbound rules (WAN to LAN) restrict access by outsiders to private resources, selectively
allowing only specific outside users to access specific resources. Outbound rules (LAN to WAN)
determine what outside resources local users can have access to.
The default inbound and outbound rules of the
modem router
are:
Inbound
. Block all access from outside except responses to requests from the LAN side.
Outbound
. Allow all access from the LAN side to the outside.
Keyword
Result
XXX
.com
Only websites with other domain suffixes (such as .edu or .gov) can be
viewed.
. ( a period)
Block all Internet browsing access.