A SERVICE OF

logo

139
14 Configuring Filters and Blocking Protocols
This chapter describes Web Configuration features that enable you
to control the data passing through your network:
f The IP filter feature enables you to create rules to block
attempts by certain computers on your LAN to access
certain types of data or Internet locations. You can also
block incoming access to computers on your LAN.
Although IP filter rules provide a very flexible and powerful
tool to enhance network security and control user activity,
they can also be complex and generally require an
advanced understanding of IP protocols.
f The bridge filter feature is similar to the IP filter feature but
operates at a lower protocol level. While IP filter rules act
on IP data packets (known as “layer 3” data), bridge filter
rules act on Ethernet and similar packets (often referred to
as “layer 2” or “MAC layer” data).
f The blocked protocols feature enables you to select from
a predefined list the protocol that you want to block. All data
passed to the ADSL/ADSL2+ Ethernet Modem Router
using a blocked protocol will be discarded, without
consideration of the source computer, destination
computer, or the device interface on which it was received.