This is an old revision of the document!
The Access Restriction menu contains functions that allow you to block:
Restrictions are done based on rules and a schedule.
Access Restriction only blocks traffic routed outbound to the Internet. It cannot restrict access between (switched) LAN clients. It also cannot block traffic when the device is used as a wireless bridge. For such scenarios, see the HOWTOs entitled: Wireless MAC filtering via script/scheduler and Block devices via script/scheduler.
Rules can be customized to block:
You can edit rules in the Web interface, and through scripts. See this HOWTO: Scripting Access Restrictions.
The table in this section displays all saved rules, both active and inactive.
All rules are listed here. However, adding/editing any rules forwards you to another menu where you edit the rules.
After clicking on the Overview table mentioned above, you will be taken to the Rule Editing page.
Here:
Enabled: Checking this enables this rule.
Description: Here, you enter a name for this rule.
Schedule: Here, you configure the schedule settings for this rule.
Type:
Applies To:
Blocked Resources:
Port / Application:
More than one rule can be configured, click the Add button to add a rule.
HTTP Request:
In this field, enter the text which to have the Access Restriction in this rule applied to it.
For example:
An entry that contains: “^begins-with.domain"
will block access to any domain that start with the text “begins-with”.
An entry that contains: ”.ends-with.net$"
will block any domain that ends with “net” .
An entry that contains: “^www.exact-domain.net"$
will block any entry that begins with “www.exact-domain” and ends with ”.net“
HTTP Requested Files:
This function will block downloads of certain file types, including:
Delete: Deletes the Access Restriction rule displayed on the screen.
Save: Saves the current rule displayed on the screen.
Cancel: Cancels the current rule change(s)/creation, and returns you to Access Restriction Overview.