How to configure Access Control on TL-WR802N/WR810N (standard router and hotspot router mode-new logo)
Access Control is used to deny or allow specific client devices to access your network with access time and content restrictions.
For example, if you want to restrict the Internet activities of host with MAC address 00-11-22-33-44-AA on the LAN to access www.tp-link.com only, please follow the steps below:
Here takes TL-WR802N as an example.
1. Login the router. Please refer to How do I log into the web-based Utility (Management Page) of TP-Link wireless router?.
2. Go to Access Control > Host and configure the host settings:
1) Click Add New.
2) Select MAC Address as the mode type. Create a unique description (e.g. host_1) for the host in the Host Description field and enter 00-11-22-33-44-AA in the MAC Address filed.
3) Click Save.
3. Go to Access Control > Target and configure the target settings:
1) Click Add New.
2) Select Domain Name as the mode type. Create a unique description (e.g. target_1) for the target in the Target Description field and enter the domain name, either the full name or the keywords (for example TP-LINK) in the Domain Name field.
Note: Any domain name with keywords in it (e.g. www.tp-link.com) will be blocked or allowed.
3) Click Save.
4. Go to Access Control > Schedule and configure the schedule settings:
1) Click Add New.
2) Create a unique description (e.g. schedule_1) for the schedule in the Schedule Description field and set the day(s) and time period.
3) Click Save.
5. Go to Access Control > Rule and add a new access control rule.
1) Click Add New.
2) Give a name for the rule in the Rule Name field. Select host_1 from the host drop-down list; select target_1 from the target drop-down list; select schedule_1 from the schedule drop-down list.
3) Leave the status as Enabled as click Save.
6. Select Enable Internet Access Control to enable Access Control function.
7. Select Allow the packets specified by any enabled access control policy to pass through the Router as the default filter policy and click Save.
Done!
Now only the specific host(s) can visit the target(s) within the scheduled time period.
Get to know more details of each function and configuration please go to Download Center to download the manual of your product.
Byla tato FAQ užitečná?
Vaše zpětná vazba nám pomůže zlepšit naše webové stránky