How to configure Access Control on TL-WR802N (standard router and hotspot router mode-new logo)

Configuration Guide
Updated 06-27-2022 08:16:13 AM 41841
This Article Applies to: 

Access Control is used to deny or allow specific client devices to access your network with access time and content restrictions.

For example, If you want to restrict the internet activities of host with MAC address 00-11-22-33-44-AA on the LAN to access www.tp-link.com only, please follow the steps below:

1. Login the router. Please refer to FAQ.

2. Go to Access Control > Host and configure the host settings:

1) Click Add New.

2) Select MAC Address as the mode type. Create a unique description (e.g. host_1) for the host in the Description field and enter 00-11-22-33-44-AA in the MAC Address filed.

3) Click Save.

3. Go to Access Control > Target and configure the target settings:

1) Click Add New.

2) Select URL Address as the mode type. Create a unique description (e.g. target_1) for the target in the Target Description field and enter the domain name, either the full name or the keywords (for example TP-Link) in the Add URL Address field. And then click Add.

Note: Any URL address with keywords in it (e.g. www.tp-link.com) will be blocked or allowed.

3) Click Save.

4. Go to Access Control > Schedule and configure the schedule settings:

1) Click Add New.

2) Create a unique description (e.g. schedule_1) for the schedule in the Schedule Description field and set the day(s) and time period. And then click Add.

3) Click Save.

5. Go to Access Control > Rule and add a new access control rule.

1) Click Add New.

2) Give a name for the rule in the Description field. Select host_1 from the LAN host drop-down list; select target_1 from the target drop-down list; select schedule_1 from the schedule drop-down list.

6. Select Enable Internet Access Control to enable Access Control function.

7. Select Deny the packets not specified by any filtering rules to passthrough this device as the default filter policy and click Save.

Done!

Now only the specific host(s) can visit the target(s) within the scheduled time period.

Get to know more details of each function and configuration please go to Download Center to download the manual of your product.

Is this faq useful?

Your feedback helps improve this site.

From United States?

Get products, events and services for your region.