User's Manual

Table Of Contents
45
6.1 Access
C
on
tr
ol
Access control is used to block specific
computers
within the local network (or even the whole network) from
accessing certain services on the
I
n
t
e
r
n
e
t
.
For
e
x
am
p
l
e
,
one
computer
can be
p
r
o
h
i
b
i
t
e
d
from surfing the
I
n
t
e
r
n
e
t
,
a
n
o
t
h
e
r
computer
from transferring files using
F
T
P
,
and the whole network
f
r
o
m
receiving incoming
e
ma
il
.
Access control defines restrictions on the types of requests that can pass
f
r
o
m
the local network out to the
I
n
t
e
r
n
e
t
,
and thus may block traffic flowing in
b
o
t
h d
i
r
e
c
t
i
o
n
s
.
I
n
the email example given
a
b
o
v
e
,
computers
in the local
n
e
t
w
o
r
k
can be
prevented
from receiving email by blocking their outgoing requests
t
o
POP3
servers on the
I
n
t
e
r
n
e
t
.
Access control also
i
n
c
o
r
p
o
r
a
t
e
s a list of preset services in the form
o
f
applications and common port
s
e
tt
i
ng
s
.
6.1a Allow or Restrict Services
To view and allow/restrict these services:
1. Select Access Control from the left side of any Security screen. The “Access
Control” screen appears.
Note: The “Allowed” section is only visible when the firewall is set to “Maximum.”
2. Click Add. The “Add Access Control Rule” screen appears.
Note: To block a service, click Add in the “Blocked” section of the Access Control screen. To allow outgoing
traffic, click Add in the “Allowed” section of the screen.