User manual

D-Link Corporation confidential
10
Feature
Detailed Description
network.
Support 24 Application Rules
2.2.3.4
Network Filter
The MAC address filter section can be used to filter network access by
machines based on the unique MAC addresses of their network adapter(s).
It is most useful to prevent unauthorized wireless devices from connecting
to your network.
Support 24 MAC Filtering Rules
2.2.3.5
Access Control
The Access Control section allows you to control access in and out of
devices on the network. Use this feature as Parental Controls to only grant
access to approved sites, limit web access based on time or dates, and/or
block access from applications such as peer-to-peer utilities or games.
Support 24 Access Control List
2.2.3.6
Website Filter
Website Filter is a function for admins to add the Web sites to be used for
Access Control.
Support 40 Website Filtering Rules
2.2.3.7
Inbound Filter
Inbound Filters can be used for limiting access to a server on the network
to a system or group of systems. Filter rules can be used with Virtual
Server, Gaming, or Remote Administration features.
Support 24 Inbound Filtering Rules
2.2.3.8
Firewall Settings
The router provides a tight firewall by virtue of the way NAT works.
Unless configuring the router to the contrary, the NAT does not respond to
unsolicited incoming requests on any port, thereby making the LAN
invisible to Internet cyberattackers.
Firewall Setting
This section allows admins to enable SPI (stateful packet inspection
also known as dynamic packet filtering) which helps to prevent
cyberattacks by tracking more state per session. It validates that the traffic
passing through that session conforms to the protocol. When the protocol
is TCP, SPI checks that packet sequence numbers are within the valid
range for the session, discarding those packets that do not have valid
sequence numbers.
NAT Endpoint Filtering
The NAT Endpoint Filtering options control how the routers NAT
manages incoming connection requests to ports that are already being
used.
Anti-Spoof Checking
This mechanism protects against activity from spoofed or forged IP
addresses, mainly by blocking packets appearing on interfaces and in
directions which are logically not possible.
DMZ Host
DMZ means Demilitarized Zone. If an application has trouble working
from behind the router, admins can expose one computer to the Internet
and run the application on that computer. When a LAN host is configured
as a DMZ host, it becomes the destination for all incoming packets that do
not match some other incoming session or rule. If any other ingress rule is
in place, that will be used instead of sending packets to the DMZ host; so,
an active session, virtual server, active port trigger, or port forwarding rule
will take priority over sending a packet to the DMZ host.
2.2.3.9
Advanced Wireless
Advanced Wireless Setup provides administrators to configure detail
wireless perimeters.
2.2.3.10
Wi-Fi Protected
Setup
Wi-Fi Protected Setup is used to easily add devices to a network using a
PIN or button press.
Wi-Fi Protected Setup
This section allows admins to enable and disable WPS.
PIN Settings
A PIN is a unique number that can be used to add the router to an existing