This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| restrict-edit [2024/10/10 16:29] – [Editing Access Restriction Rules] -Condense hogwild | restrict-edit [2025/09/15 15:16] (current) – [Access Restriction] hogwild | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Access Restriction ====== | ====== Access Restriction ====== | ||
| - | The Access Restriction menu contains functions that allow you to block: | + | The Access Restriction menu contains functions that let you block: |
| \\ | \\ | ||
| Line 9: | Line 9: | ||
| * WiFi access to the network. | * WiFi access to the network. | ||
| - | \\ Access Restriction **rules only apply to HTTP (unencrypted) connections**. As a result, this function is somewhat obsolete in terms of blocking | + | \\ Access Restriction **rules only apply to HTTP (unencrypted) connections**. However, almost all web connections now use HTTPS (secure HTTP). As a result, this function is somewhat obsolete in terms of its ability to block Internet content. |
| Restrictions are done based on rules and a schedule. | Restrictions are done based on rules and a schedule. | ||
| - | Access Restriction only blocks traffic routed outbound to the Internet. It **cannot** restrict access between (switched) LAN clients. It also cannot block traffic when the device is used as a wireless bridge. For such scenarios, see the HOWTOs | + | Access Restriction only blocks traffic routed outbound to the Internet. It **cannot** restrict access between (switched) LAN clients. It also cannot block traffic when the device is used as a wireless bridge. For such scenarios, see the HOWTOs: [[wireless_filtering|Wireless MAC filtering via script/ |
| \\ | \\ | ||
| Rules can be customized to block: | Rules can be customized to block: | ||
| + | |||
| + | \\ | ||
| * Only certain sources | * Only certain sources | ||
| * Only certain destinations | * Only certain destinations | ||
| * Only certain ports | * Only certain ports | ||
| - | * Only certain protocols, or applications | + | * Only certain protocols or applications |
| * Only certain HTTP activity | * Only certain HTTP activity | ||
| * Combinations of the above | * Combinations of the above | ||
| Line 28: | Line 30: | ||
| \\ | \\ | ||
| - | You can edit rules in the Web interface, and through scripts. See this HOWTO: [[access_restrictions|Scripting Access Restrictions]]. | + | Rules can be edited |
| + | |||
| + | See this HOWTO: [[access_restrictions|Scripting Access Restrictions]]. | ||
| ===== Access Restriction Overview ===== | ===== Access Restriction Overview ===== | ||
| - | The table in this section | + | The table here displays all saved rules, both active and inactive. |
| - | All rules are listed here. However, adding/ | + | All rules are listed here. However, adding/ |
| - | \\ {{:access_restriction_overview_cropped.png?775}} | + | \\ {{:: |
| Line 48: | Line 52: | ||
| \\ | \\ | ||
| - | * To delete an existing rule, click on it on the Overview | + | * To delete an existing rule, click on it on the Overview |
| - | * To **Edit **an existing rule, click on it on the Overview | + | * To **Edit **an existing rule, click on it on the Overview |
| - | * To **Add** a new rule, click the // | + | * To **Add** a new rule, click the // |
| * On the Rule Editing page, sequential rule numbers will display \\ at the top left (For example: ID: 01) | * On the Rule Editing page, sequential rule numbers will display \\ at the top left (For example: ID: 01) | ||
| - | * These numbers will increment by 1 for each new rule you create.\\ | + | * These numbers will increment by 1 for each new rule you create. |
| - | \\ {{::access_restriction_editing_cropped.png?700x593}} | + | \\ |
| + | |||
| + | \\ {{::misc-access_restrictions-2025.3.png?800}} | ||
| + | |||
| + | \\ | ||
| \\ | \\ | ||
| - | \\ **Enabled: | + | \\ **Enabled: |
| \\ | \\ | ||
| - | **Description: | + | **Description: |
| \\ | \\ | ||
| - | **Schedule: | + | **Schedule: |
| - | | + | \\ |
| - | * Every Day - Checking | + | |
| - | * Time - Here, set the start time and end time when this rule will be applied. | + | |
| - | * Days - Here, set the Days on which this rule will be applied. | + | * Every Day - checking |
| + | * Time - here, set the start time/end time the rule will be applied. | ||
| + | * Days - here, set the Days on which this rule will be applied. | ||
| \\ **Type:** | \\ **Type:** | ||
| - | * Normal Access Restriction - Sets the rule to include all options | + | * Normal Access Restriction - sets the rule to include all \\ options |
| - | * Disable Wireless - This rule will disable all WiFi interfaces | + | * Disable Wireless - this rule will disable all router |
| \\ **Applies To:** | \\ **Applies To:** | ||
| - | * All Computers/ | + | * All Computers/ |
| - | * The Following... - This rule will apply to only the specified network clients. \\ Add clients by entering their MAC or IP address in the MAC/IP Address field, \\ then clicking // | + | * The Following... - the rule will apply to only the specified network clients.\\ Add clients by entering their MAC or IP address in the MAC/IP Address field, \\ then clicking // |
| - | * All Except... - This rule will apply to all network clients except the one specified. \\ Think of this as somewhat | + | * All Except... - the rule will apply to all network clients except the one specified.\\ Think of this as similar to a client whitelist. \\ Add clients by entering their MAC or IP address in the MAC/IP \\ Address box, then clicking // |
| \\ **Blocked Resources: | \\ **Blocked Resources: | ||
| - | * Block All Internet Access - Bblocks | + | * Block All Internet Access - blocks |
| \\ **Port / Application: | \\ **Port / Application: | ||
| Line 92: | Line 102: | ||
| More than one rule can be configured, click the //Add// button to add a rule. | More than one rule can be configured, click the //Add// button to add a rule. | ||
| - | | + | \\ |
| - | * Port - Select | + | |
| - | * Application - Select | + | |
| - | * Address - Select | + | * Port - select |
| + | * Application - select | ||
| + | * Address - select | ||
| + | |||
| + | \\ \\ | ||
| - | \\ **HTTP Request:** | + | **HTTP Request:** |
| - | In this field, enter the text which to have the Access | + | In this field, enter the text on which the Access |
| \\ | \\ | ||
| Line 123: | Line 137: | ||
| This function will block downloads of certain file types, including: | This function will block downloads of certain file types, including: | ||
| - | * ActiveX - This will block Windows controls (which usually have \\ an.ocx or .cab file ending). | + | * ActiveX - this will block Windows controls (which usually have \\ an.ocx or .cab file ending). |
| - | * Flash (swf) - This option will block Flash .swf files. | + | * Flash (swf) - this option will block Flash .swf files. |
| - | * Java (class, jar) - This option blocks Java (usually class or .jar) files. | + | * Java (class, jar) - this option blocks Java (usually class or .jar) files. |
| \\ \\ | \\ \\ | ||
| - | **Delete: | + | **Delete: |
| \\ | \\ | ||
| - | **Save: | + | **Save: |
| \\ | \\ | ||
| - | **Cancel: | + | **Cancel: |