31
Example:
In this example:
1. URL include “www.msn.com” will be blocked, and the action will be record in log-file.
2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file.
3. URL include “www.google.com” will be blocked, but the action will not be record in log-file.
4.
IP address X.X.X.1~ X.X.X.20 can access network without restriction.
Содержание UIS1400-C8
Страница 13: ...13 4 4 Basic Setting ...
Страница 14: ...14 4 4 1 Primary Setup WAN Type Virtual Computers Press Change ...
Страница 20: ...20 4 5 Forwarding Rules 4 5 1 Virtual Server ...
Страница 24: ...24 4 6 Security Settings ...
Страница 38: ...38 4 7 Advanced Settings ...
Страница 50: ...50 4 8 Toolbox ...
Страница 51: ...51 4 8 1 System Log You can View system log by clicking the View Log button ...
Страница 52: ...52 4 8 2 Firmware Upgrade You can upgrade firmware by clicking Firmware Upgrade button ...