52
N+ Wireless Modem Router
sections
table of contents
1
2
3
4
5
7
8
9
10
6
UsINg THe Web-based adVaNCed UseR INTeRfaCe
The third configuration for the Access Control list is the “URL List” for
the URL addresses that are to be blocked or allowed . Users can choose
to “Block All URLs”, “Allow All URLs”, or configure their own list of URLs .
The fourth configuration for the Access Control list is the “URL Keyword
List” for the URL address keywords that are to be blocked or allowed .
The default value is blank for this list and the user can configure a list of
URL address keywords .
enabling the demilitarized Zone (dMZ)
The DMZ feature allows you to specify one computer on your network
to be placed outside of the firewall . This may be necessary if the firewall
is causing problems with an application such as a game or video
conferencing application . Use this feature on a temporary basis . The
computer in the DMZ is
NoT
protected from hacker attacks .