Tp-Link TL-ER6120 — настройка управления пользователями и приложениями в системе [141/167]
Превью страниц
Страница 141 /
167
![Tp-Link TL-ER6120 Инструкция по эксплуатации онлайн [141/167] 39127](/views2/1042332/page141/bg8d.png)
-136-
Figure 4-10 User Config - Batch
z View
Choose the menu User Group→View to load the configuration page. Add all the Users you just
created into the Group 1 and click the <Save> button to apply.
4.3.3.2 App Control
Choose the menu Firewall→App Control→Control Rules to load the configuration page. Check the
box before Enable Application Control and click <Save> to apply. Then continue with the following
settings:
Settings:
Object: Group
Group: group1
Application:
Click the <Application List> button and select the
applications desired to be blocked on the popup window.
Status: Activate
Содержание
134- Gigabit dual wan vpn router
- Tl er6120
- Ce mark warning
- Copyright trademarks
- Fcc statement
- Contents
- Package contents
- Overview of this guide
- Intended readers
- Conventions
- Chapter 1 about this guide
- Overview of the router
- Chapter 2 introduction
- Features
- Front panel
- Appearance
- Rear panel
- Network
- Status
- Chapter 3 configuration
- System mode
- Dhcp reservation
- Dhcp client
- Mac address
- Switch
- Statistics
- Port mirror
- Rate control
- Port config
- Port status
- Port vlan
- User group
- Nat setup
- Advanced
- One to one nat
- Multi nets nat
- Virtual server
- Port triggering
- Traffic control
- Bandwidth control
- Session limit
- Session list
- Load balance
- Configuration
- Policy routing
- Link backup
- Protocol
- Static route
- Routing
- Route table
- Firewall
- Anti arp spoofing
- Ip mac binding
- Arp scanning
- Attack defense
- Arp list
- Mac filtering
- Url filtering
- Access control
- Web filtering
- Access rules
- Service
- Control rules
- App control
- Database
- Ike policy
- Ike proposal
- Ipsec policy
- Ipsec proposal
- Ipsec sa
- L2tp pptp tunnel
- L2tp pptp
- Ip address pool
- Services
- Pppoe server
- List of l2tp pptp tunnel
- General
- Ip address pool
- Account
- Exceptional ip
- List of account
- E bulletin
- Dynamic dns
- Dyndns
- Peanuthull
- Comexe
- Maintenance
- Administrator
- Admin setup
- Login parameter
- Remote management
- Management
- Factory defaults
- Reboot
- Export and import
- License
- Firmware upgrade
- Statistics
- Interface traffic statistics
- Ip traffic statistics
- Diagnostics
- Online detection
- Network requirements
- Chapter 4 application
- Network topology
- Internet setting
- Configurations 4 configurations
- Configurations
- System mode
- Link backup
- Internet connection
- Vpn setting
- Ipsec vpn
- Pptp vpn setting
- Network management
- User group
- App control
- Bandwidth control
- Session limit
- Network security
- Lan arp defense
- Wan arp defense
- Attack defense
- Traffic monitoring
- Configuration
- Chapter 5 cli
- Interface mode
- Online help
- Ip mac
- Command introduction
- History
- Appendix a hardware specifications
- Appendix b faq
- Appendix c glossary
Похожие устройства
-
Tp-Link Archer BE450Краткая инструкция -
Tp-Link BE7200Краткое руководство пользователя -
Tp-Link Archer EC220 G5Руководство по настройке -
Tp-Link EX220 AX1800Руководство пользователя -
Tp-Link Wi-Fi 4G LTE роутерКраткая инструкция по использованию -
Tp-Link TL-WR3002XИнструкция по применению -
Tp-Link AC750Руководство по работе с устройством -
Tp-Link TL-MR6400 черныйРуководство по эксплуатации -
Tp-Link TL-MR100 N300Руководство по эксплуатации -
Tp-Link TL-MR105 N300Руководство по эксплуатации -
Tp-Link Archer MR500 AC1200Руководство по эксплуатации -
Tp-Link TL-WR840N N300Руководство по эксплуатации
Узнайте, как добавить пользователей в группы и настроить контроль приложений. Примените изменения для эффективного управления доступом и безопасности.