This is an old revision of the document!
The Access Restriction menu contains functions that allow you to block:
Restrictions are done based on rules and a schedule.
Access Restriction only blocks traffic routed outbound to the Internet. It cannot restrict access between (switched) LAN clients. It also cannot block traffic when the device is used as a switch only or as a wireless bridge. For those scenarios, see the HOWTOs entitled: Wireless MAC filtering via script/scheduler and Block devices via script/scheduler.
Rules can be customized to block:
Rules can be edited in the Web interface, and through scripts. Please see: Scripting Access Restrictions in the HOWTOs section.
The table in this section displays all saved rules, both active and inactive.
All rules are listed here. However, adding/editing any rules will forward you to another menu where you can edit the rules.
After clicking on the Overview table mentioned above, you will be taken to the Rule Editing page.
Here:
Enabled: Checking this enables the rule this rule.
Description: Here, you enter a name for this rule.
Schedule: Here, you configure settings for this rule's schedule.
Type:
Applies To:
Blocked Resources:
Port / Application:
More than one rule can be configured, click the Add button to add a rule.
HTTP Request:
word text
HTTP Requested Files:
This function will block download of certain file types, including the following:
Delete: Deletes the Access Restriction rule displayed on the screen.
Save: Saves the current rule displayed on the screen.
Cancel: Cancels the current rule change(s) or creation, then returns you to the Access Restriction Overview page.