Example for web security, Network requirements, Configuration scheme – TP-Link Omada ER8411 VPN Router User Manual
Page 147: Configuration procedure, Configuration scheme configuration procedure, 2 example for web security, 1 network requirements, 2 configuration scheme, 3 configuration procedure

User Guide 138
Configuring Behavior Control
Configuration Examples
3.2 Example for Web Security
3.2.1 Network Requirements
In the diagram below, the company’s hosts are connected to a layer 2 switch and access
the internet via the router. For security reasons, it is required that the users in the LAN
cannot log in, submit comments or download rar files on the internet.
Figure 3-9
Network Topology
Internet
R
R
Layer 2 Switch
router
LAN
...
...
WAN
3.2.2 Configuration Scheme
We can configure Web Security to meet these requirements. To block behaviors such as
login and comment submitting, we can configure the router to block HTTP post; to block
downloading of rar files, we can specify the suffix “rar” in the file suffix column.
3.2.3 Configuration Procedure
Follow the steps below to complete the configuration:
1) Choose the menu
Behavior Control > Web Security > Web Security
and click
Add
to
load the following page. Select “IPGROUP_LAN” as the
IP Group
, enable
Block HTTP
Post
, enter “rar” in the
File Suffix
filed, select “Any” as the
Effective Time
, and keep the
Status
as “Enable”. Click
OK
.