A SERVICE OF

logo

52
N+ Wireless Modem Router
SECTIONSTable of Contents 1 2 3 4 5 7 8 9 106
USING THE WEB-BASED ADVANCED USER INTERFACE
The third configuration for the Access Control list is the “URL List” for
the URL addresses that are to be blocked or allowed. Users can choose
to “Block All URLs”, “Allow All URLs”, or configure their own list of URLs.
The fourth configuration for the Access Control list is the “URL Keyword
List” for the URL address keywords that are to be blocked or allowed.
The default value is blank for this list and the user can configure a list of
URL address keywords.
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network
to be placed outside of the firewall. This may be necessary if the firewall
is causing problems with an application such as a game or video
conferencing application. Use this feature on a temporary basis. The
computer in the DMZ is NOT protected from hacker attacks.