31
Example:
In this example:
1. URL include “www.msn.com” will be blocked, and the action will be record in log-file.
2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file.
3. URL include “www.google.com” will be blocked, but the action will not be record in log-file.
4.
IP address X.X.X.1~ X.X.X.20 can access network without restriction.
Summary of Contents for UIS1400-C8
Page 13: ...13 4 4 Basic Setting ...
Page 14: ...14 4 4 1 Primary Setup WAN Type Virtual Computers Press Change ...
Page 20: ...20 4 5 Forwarding Rules 4 5 1 Virtual Server ...
Page 24: ...24 4 6 Security Settings ...
Page 38: ...38 4 7 Advanced Settings ...
Page 50: ...50 4 8 Toolbox ...
Page 51: ...51 4 8 1 System Log You can View system log by clicking the View Log button ...
Page 52: ...52 4 8 2 Firmware Upgrade You can upgrade firmware by clicking Firmware Upgrade button ...