TP-Link TL-ER604W TL-ER604W V1 User Guide 1910010844 - Page 94

VPN

Page 94 highlights

Effective Time: Description: Status: and Proxy. The default setting is to limit all the applications in the application list except for Basic and Proxy. Specify the time for the entry to take effect. Give a description for the entry. Activate or inactivate the entry.  List of Rules You can view the information of the entries and edit them by the Action buttons. The first entry in Figure 3-59 indicates: The group1 is applied with Application Rules. You can click to view the limited applications in the popup checkbox. The effective time of this entry is 7:00-9:00 on Monday, Tuesday, Friday, Saturday and Sunday. This entry is enabled. Note: To set the group and group members, please refer to 3.3.1 Group. 3.5.5.2 Database On this page, you can upgrade the application database. Choose the menu Firewall→App Control→Database to load the following page. Figure 3-60 Database The database refers to all the applications in the application list on the Application Rules page, you can download the latest database from http://www.tp-link.com, Click the button and select the file, and then click the button to upgrade the database. 3.6 VPN VPN (Virtual Private Network) is a private network established via the public network, generally via the Internet. However, the private network is a logical network without any physical network lines, so it is called Virtual Private Network. With the wide application of the Internet, more and more data are needed to be shared through the Internet. Connecting the local network to the Internet directly, though can allow the data exchange, will -89-

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159

-89-
and Proxy. The default setting is to limit all the applications in the
application list except for Basic and Proxy.
Effective Time:
Specify the time for the entry to take effect.
Description:
Give a description for the entry.
Status:
Activate or inactivate the entry.
List of Rules
You can view the information of the entries and edit them by the Action buttons.
The first entry in Figure 3-59 indicates: The group1 is applied with Application Rules. You can click
<View> to view the limited applications in the popup checkbox. The effective time of this entry is
7:00-9:00 on Monday, Tuesday, Friday, Saturday and Sunday. This entry is enabled.
Note:
To set the group and group members, please refer to
3.3.1 Group
.
3.5.5.2
Database
On this page, you can upgrade the application database.
Choose the menu
Firewall
App Control
Database
to load the following page.
Figure 3-60 Database
The database refers to all the applications in the application list on the Application Rules page, you can
download the latest database from
, Click the <Browse> button and select the
file, and then click the
<Upgrade>
button to upgrade the database.
3.6 VPN
VPN (Virtual Private Network) is a private network established via the public network, generally via the
Internet. However, the private network is a logical network without any physical network lines, so it is
called Virtual Private Network.
With the wide application of the Internet, more and more data are needed to be shared through the
Internet. Connecting the local network to the Internet directly, though can allow the data exchange, will