Joke Collection Website - Talk about mood - How to avoid being controlled by others?

How to avoid being controlled by others?

1, bandwidth management (traffic management)

Select "Enable host bandwidth management", and then set the uplink and downlink bandwidths respectively to control the public network bandwidth (i.e. public network data traffic) of the host; Select "Intelligent Control of Host Bandwidth", and then set the uplink and downlink bandwidths respectively, so that the bandwidth of this host can be intelligently controlled, that is, when it is found to be "BT, donkey", the system will automatically limit the bandwidth of this host to the uplink and downlink bandwidth you set, thus effectively avoiding the excessive occupation of network bandwidth by P2P download.

2. Traffic management:

The system can not only control the bandwidth or traffic of any host in the LAN, but also control the traffic of any host in the LAN. As shown in Figure 6 above, open the "Traffic Limit" dialog box, and you can set a public network daily traffic or uplink and downlink daily traffic for this host. If this traffic exceeds, the system will automatically cut off the host's public network connection, that is, prohibit it from surfing the Internet.

In addition, you can also view the cumulative traffic of this host (192.168.0.105) at a certain time of the day in the "Network Host Scan" on the left.

3.P2P download restrictions

Open the "P2P download restriction" dialog box, and you can select various P2P tools to be banned, such as BT, E-donkey, PP click, card alliance, etc. You can choose to control the download of a P2P tool alone, or you can choose to control all.

Control P2P download

Note: Because "Thunder" is a multipoint HTTP download, the HTTP protocol is applied instead of P2P protocol. Restricting the download of Thunder here means that downloading from multiple servers is prohibited, but downloading from a single server cannot be prohibited. But because even downloading from a single point can be very fast. Therefore, if you want to completely ban "Thunder" download, you also need to ban the HTTP download of the corresponding file type in "Normal download restrictions". All P2P tools except Thunder can be completely intercepted by the system.

5. Normal download restrictions

Opens the Normal Download Restrictions dialog box, where you can restrict all HTTP and FTP downloads. To restrict HTTP download, you must enter a file suffix; To restrict FTP download, you can enter the file suffix to restrict it, or you can directly enter the wildcard "*" to prohibit all FTP downloads.

6. Website control

Open the "www restrictions" dialog box in the upper left corner. Here, you can completely ban the public network access of LAN hosts, and set up blacklists, whitelists and stock websites for LAN hosts. The system can also prevent LAN hosts from enabling agents to surf the Internet or act as agents, and can also record URL browsing of LAN hosts.

7. Portal mailbox control function

In view of the fact that many small and medium-sized enterprises do not have their own independent enterprise mailboxes, the system provides special permission functions for portal mailboxes. That is, you set URL control, but you can allow employees to use the mailbox of the portal. For example, it is forbidden for LAN hosts to access Sina website (Sina website can be blacklisted, or LAN hosts can be completely forbidden to access public network), as long as they choose mailboxes (ordinary mailboxes, corporate mailboxes, VIP mailboxes, etc.). ) That allows you to stand here using Sina.com, and employees can still visit the homepage of Sina.com and log in to send and receive letters, but they can't click on any other links on Sina.com, including all the links in the mailbox.

8. Chat control

Open the "Chat Restriction" dialog box, the system can control any host in the LAN to log in and use various chat tools, and the system can completely block QQ, MSN, universal communication and Netease bubbles. In addition, any chat tool can be banned through ACL rules provided by the system.

9.ACL access rules

Opens the ACL Rules dialog box, where you can set public network messages that are blocked from being sent by LAN hosts.

With the help of ACL rules, you can prohibit any host in the LAN from accessing any IP through any protocol and any port. In this way, you can intercept the public network messages of any LAN host, such as online games. Add ACL rules: for example, the name of the rule is "Winger Online Game World", the local IP is selected as any, the target IP is selected as any, the protocol is selected as TCP, and the port is selected as 4000. In this way, all hosts in the LAN can be prohibited from connecting to the "winger game".

10, control time setting

Opens the time dialog box, where you can set the control time. You can set the total control time (blue).

, and you can set the control working time (9: 00 am-17: 00 am). The system always controls by default. You can right-click to deselect "Working Time" or set no control time. But if you want all the controls to take effect, you must choose the control time.