Configuring firewall, Configuring behavior control – TP-Link Omada ER8411 VPN Router User Manual

Page 5

Advertising
background image

Configuring Firewall

Firewall ................................................................................................................................................................................105

Overview ...................................................................................................................................................................................................105
Supported Features ...........................................................................................................................................................................105

Firewall Configuration ...................................................................................................................................................107

Anti ARP Spoofing ...............................................................................................................................................................................107

Adding IP-MAC Binding Entries .....................................................................................................................................107
Enable Anti ARP Spoofing .................................................................................................................................................110

Configuring Attack Defense ..........................................................................................................................................................112
Configuring MAC Filtering ...............................................................................................................................................................113
Configuring Access Control ..........................................................................................................................................................115

Configuration Examples ...............................................................................................................................................117

Example for Anti ARP Spoofing ...................................................................................................................................................117

Network Requirements .......................................................................................................................................................117
Configuration Scheme ........................................................................................................................................................117
Configuration Procedure ...................................................................................................................................................118

Example for Access Control .........................................................................................................................................................120

Network Requirements .......................................................................................................................................................120
Configuration Scheme ........................................................................................................................................................121
Configuration Procedure ...................................................................................................................................................121

Configuring Behavior Control

Behavior Control .............................................................................................................................................................126

Overview ...................................................................................................................................................................................................126
Supported Features ...........................................................................................................................................................................126

Behavior Control Configuration ................................................................................................................................127

Configuring Web Filtering ...............................................................................................................................................................127

Configure Web Group Filtering .......................................................................................................................................127
Configuring URL Filtering ...................................................................................................................................................130

Configuring Web Security ...............................................................................................................................................................132

Configuration Examples ...............................................................................................................................................134

Example for Access Control .........................................................................................................................................................134

Network Requirements .......................................................................................................................................................134
Configuration Scheme ........................................................................................................................................................134
Configuration Procedure ...................................................................................................................................................135

Example for Web Security ..............................................................................................................................................................138

Network Requirements .......................................................................................................................................................138

Advertising