Port Isolation - ZyXEL Communications P-334U User Manual

802.11a/g wireless router
Hide thumbs Also See for P-334U:
Table of Contents

Advertisement

P-334U/P-335U User's Guide
Table 56 Content Blocking Categories
CATEGORY
Gambling
Hacking/Proxy
Avoidance
Illegal Drugs
Illegal/
Questionable
Intimate Apparel/
Swimsuit
Nudity
Pornography
Sex Education
Violence/Hate/
Racism
Weapons

13.5 Port Isolation

When a computer is attacked by malicious programs or has security vulnerability, you can use
port isolation to prevent the virus or attack from spreading through the whole network. Port
isolation stops the communication between the port (connected to the infected/vulnerable
computer) and other port(s).
Once the ZyXEL Device detects that the infected host, C in the following figure, is infected, it
stops this port communicating with it's other ports. The infected host can still access the
Internet to download a patch and remove the virus but cannot communicate with the devices
(A, B and D) connected to other ports (or interfaces). The ZyXEL Device allows traffic
passage between that port and other port(s) automatically once the infected computer is fixed.
164
DESCRIPTION
Sites at which users can place bets or participate in betting pools (including
lotteries) online. Also includes sites that provide information, assistance,
recommendations, or training on placing bets or participating in games of chance.
Does not include sites that sell gambling related products or machines. Also does
not include off-line casino and hotel sites, unless they meet one of the foregoing
criteria.
Sites providing information on illegal or questionable access to, or use of,
communications equipment and software, or that provide information on gaining
unauthorized access to URLs.
Sites that promote, offer, sell, supply, encourage or otherwise advocate the illegal
use, cultivation, manufacture or distribution of drugs, pharmaceuticals, intoxicating
plants and chemicals, and related paraphernalia.
Sites that advocate or give advice on performing illegal acts such as service theft,
evading law enforcement, fraud, burglary techniques, and plagiarism. Also
includes sites that provide or sell questionable educational materials such as term
papers.
Sites that sell or contain images of swimsuits, intimate apparel, or other suggestive
clothing. Does not include sites selling undergarments as a subset of another
business.
Sites that contain nude or seminude depictions of the human body. These
depictions need not be sexual in intent or effect. May include sites containing nude
paintings or photo galleries of an artistic nature. This category also includes nudist
or naturist sites containing pictures of nude individuals.
Sites that contain sexually explicit material for the purpose of arousing a sexual
interest.
Sites that provide graphic information on reproduction, sexual development, safe
sex practices, sexuality, birth control, and sexual development. Also includes sites
that offer tips for better sex as well as products used for sexual enhancement.
Sites that depict extreme physical harm to people or property, or which advocate or
provide instructions on how to cause such harm. Also includes sites that advocate
or depict hostility or aggression toward, or the denigration of, an individual or group
on the basis of race, religion, gender, nationality, ethnic origin, and so forth.
Sites that sell, review, or describe weapons such as guns, knives, martial arts
devices, and related accessories, or that provide information on their use or
modification. Does not include sites that promote weapons collecting, or groups
that either support or oppose weapons ownership.
Chapter 13 Trend Micro Home Network Security (TMSS)

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-335u

Table of Contents