Example for web security, Network requirements, Configuration scheme – TP-Link Omada ER8411 VPN Router User Manual

Page 147: Configuration procedure, Configuration scheme configuration procedure, 2 example for web security, 1 network requirements, 2 configuration scheme, 3 configuration procedure

Advertising
background image

User Guide 138

Configuring Behavior Control

Configuration Examples

3.2 Example for Web Security

3.2.1 Network Requirements

In the diagram below, the company’s hosts are connected to a layer 2 switch and access

the internet via the router. For security reasons, it is required that the users in the LAN

cannot log in, submit comments or download rar files on the internet.

Figure 3-9 

Network Topology

Internet

R

R

Layer 2 Switch

router

LAN

...

...

WAN

3.2.2 Configuration Scheme

We can configure Web Security to meet these requirements. To block behaviors such as

login and comment submitting, we can configure the router to block HTTP post; to block

downloading of rar files, we can specify the suffix “rar” in the file suffix column.

3.2.3 Configuration Procedure

Follow the steps below to complete the configuration:
1) Choose the menu

Behavior Control > Web Security > Web Security

and click

Add

to

load the following page. Select “IPGROUP_LAN” as the

IP Group

, enable

Block HTTP

Post

, enter “rar” in the

File Suffix

filed, select “Any” as the

Effective Time

, and keep the

Status

as “Enable”. Click

OK

.

Advertising