Network Objects - ActionTec MI424-WR User Manual

Wireless broadband router
Hide thumbs Also See for MI424-WR:
Table of Contents

Advertisement

Chapter 8 Using Advanced Settings
multicasting enables
n
capabilities over networks and may also be useful
IGMP
UP
P
when connected to the Internet through the Router. When an application run-
ning on a computer in the network sends out a request to join a multicast group,
the Router intercepts and processes the request. If the Router is set to "Minimum
Security" no further action is required. However, if the Router is set to "Typical
Security" or "Maximum Security," the group's
address must be added to the
IP
Router's "Multicast Groups" screen. This will allow incoming messages addressed to
the group to pass through the firewall and on to the correct networked computer.
1. Select Routing in the Advanced screen.
2. Activate the "Internet Group Management Protocol" check-box.
3. Click OK.
Domain Routing
Domain routing is used in multi-router local network configurations. Normally,
to accesss a device connected to one router from another router on the network,
its
address must be used. Activating domain routing (by clicking in the appro-
IP
priate check box) allows the user to access to the computer by name (as well as
IP
address).

Network Objects

Network objects is used to define a part of the Router's network (a group of
computers, for example) by
addresses,
addresses, and/or host names. The
MAC
IP
defined part becomes a "network object," and settings, such as configuring system
rules, can be applied to all the devices defined as part of the network object at once.
For example, instead of setting the same website filtering configuration to five com-
puters one at a time, the computers can be defined as a network object, and website
filtering configuration can then be applied to all the computers simultaneously.
Network objects can be used to apply security rules based on host names instead
of
addresses. This may be useful, since
addresses change from time to time.
IP
IP
Moreover, it is possible to define network objects according to
addresses, mak-
MAC
ing rule application more persistent against network configuration settings.
129

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents