139
14
Configuring Filters and Blocking Protocols
This chapter describes Configuration Manager features that enable
you to control the data passing through your network:
The IP filter feature enables you to create rules to block
attempts by certain computers on your LAN to access
certain types of data or Internet locations. You can also
block incoming access to computers on your LAN.
Although IP filter rules provide a very flexible and powerful
tool to enhance network security and control user activity,
they can also be complex and generally require an
advanced understanding of IP protocols.
The bridge filter feature is similar to the IP filter feature but
operates at a lower protocol level. While IP filter rules act
on IP data packets (known as “layer 3” data), bridge filter
rules act on Ethernet and similar packets (often referred to
as “layer 2” or “MAC layer” data).
The blocked protocols feature enables you to select from
a predefined list the protocol that you want to block. All data
passed to the ADSL/Ethernet router using a blocked
protocol will be discarded, without consideration of the
source computer, destination computer, or the device
interface on which it was received.