Draytek VIGOR 3300 User Manual page 91

Vigor 3300 series broadband voip/security/load balance router
Hide thumbs Also See for VIGOR 3300:
Table of Contents

Advertisement

Malicious code may be embedded in some executable objects, such as ActiveX, Java Applet,
compressed files, executable files, Proxy, and Multimedia. For example, an ActiveX object
with malicious code may gain unlimited access to the system.
Java
ActiveX
Compressed Files
Execution Files
Cookie
Proxy
Multimedia Files
F
i
l
t
e
r
S
F
i
l
t
e
r
Filter Schedule function controls what times the URL content filter should be active. It can
specify what times the URL content filtering facility should be active.
Vigor3300 Series User's Guide
c
h
e
d
u
l
e
S
c
h
e
d
u
l
e
Activates the Block Java object function. The router will
discard Java objects from the Internet.
Activates the Block ActiveX object function. The router will
discard ActiveX object from the Internet.
Activates the Block Compressed file function to prevent from
downloading of any compressed file. These following types of
compressed files are blocked by the router.
.zip / .rar /.arj /.ace / .cab /.sit
Activates the Block Executable file function to prevent from
downloading of any executable file. The following types of
executable files are blocked by the router.
.exe /.com /.scr /.pif /.bas /.bat /.inf / .reg
Activates the Block Cookie function. Cookies are used by many
websites to create "stateful" sessions for tracking Internet users,
which would violate the users' privacy. The router will filter out
all cookies-related transmissions.
Activates the Block Proxy function. The router will filter out all
proxy-related transmissions.
Activates the Block Multimedia function. The router will filter
out multimedia from any website.
87

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigor 3300bVigor 3300vVigor 3300b+

Table of Contents

Save PDF