![]() Technically, this means the router processes the rules more efficiently, though real world in a SOHO infrastructure with only a few rules such as this, you probably wouldn't perceive any difference in performance. If you're an online gamer, then maybe you'd put your COD rules first. You might also notice that I've ranked the rules in order of their prevalence, ie web browsing is first, because that's what most traffic is so you want that to "hit" as early as possible. If your router processes the rules in order until it finds a "hit" then stops, (an often used paradigm,) coding the rules like this also means they get evaluated more efficiently in that, (say) HTTPS traffic only has to process 2 rules before it finds a hit, whereas with the original example, all rules have to be processed for all "good" traffic. (To coin a phrase - "if you're not on the list, you're not gettin in." ) That way there's no chance of anything sneaking through that we forgot to rule out. That is, we set up a default rule that blocks everything, then explicitly code rules to permit the stuff we want allow. Usually when we do this on "proper" firewalls/routers, we do it slightly differently: We use a "default deny, explicit permit" paradigm rather than a "default permit, explicit deny" as illustrated above. Her PC > Your PC (ICS) > Proxy Server software > router > internet Your other option is to setup ICS through your PC as a Proxy Server (instead of directly through the router), and then you can log everything that goes through your PC with the proxy server software I also block all social networking sites, because I found that she was wasting all her time on these sites and not doing her homework, leading to bad marks in school Some people may think the above suggestions are draconian, but my daughters online safety is far more important If she disobeys these rules, then remove access to the internet completely, and only allow it if she needs it for homework etc If you want even more control, you could install a hidden version of VNC remote software, to see what she is looking atīut from experience with my own teenage daughter, you will find that talking to your daughter and laying down some internet ground rules first (like insisting that she gives you her Username and Password), and explaining what you will do if she breaks them, is the best option Most of these loggers also have the ability to be hidden from the user You could map a hidden drive on her PC ('Z' for example) to your PC, and all the logs will be saved there This stops MSN from working, and also stops online gamingīut if you Google 'free internet logger', you can find a program to install on her PC This then only allows the following ports to work What I do on my DG834G is setup 5 different blocking rules
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |