Content Filtering - Edit URL Blacklist for the Dlink DFL-1100Router Sceenshot

Back to the Dlink DFL-1100



Screenshots from PortForward.com


D-Link DFL-1100 - HTTP Content Filtering HTTP Content Filtering Edit Destination URL Global Blacklist: The URL blacklist can be used to deny access to complete sites, to file types by extension, or to URLs with certain words in them. Use e.g. "*example.org/*" to disallow access to an entire site. Blank lines and lines beginning with "#" are ignored. # # Example for blocking all access to a whole site: # # example.com/* # *.example.com/* # # Or, a shorter variant that runs the risk of blocking sites whose # names end with the same text: # # *example.com/* # # # Deny access to potentially dangerous file types: # # Malicious executables can be downloaded by exploits *.exe *.scr *.cpl *.pif # *.com -- probably not a good idea given the .com TLD # Malicious scripts can be downloaded by exploits *.vb *.vbd *.vbe *.vbs *.vbx *.bat *.cmd *.wsc *.wsf *.wsh *.sct # Shell scraps can contain executables and invoke nearly any command *.shb *.shs # Windows installer files - prevent unauthorized downloads and installs *.msi *.msp # "HTML Applications" -- affected by vulnerabilities *.hta *.htc # Windows media player skin file -- affected by vulnerabilities *.wms *.wmz *.wmd # Multiple vulnerabilities use compiled HTML (chm) files, especially in conjunction with HTML Help, so block .hlp too *.chm *.hlp # Vulnerabilities in MIDI decoders *.mid *.midi # The Office suite has had multiple vulnerabilities over the years *.ade *.adp *.clp *.csv *.dif *.doc *.dot *.mad *.maf *.mam *.maq *.mar *.mat *.mcw *.mda *.mdb *.mde *.mdn *.mdt *.mdv *.mdw *.mst *.odc *.ofn *.pbk *.pcd *.pip *.pot *.ppa *.pps *.ppt *.ppz *.pwz *.slk # *.rtf -- can contain ms word data too though *.w51 *.w60 *.w61 *.wbk *.wiz *.wk1 *.wk3 *.wkb *.wks *.wll *.wmc *.wri *.wp *.wp4 *.wp5 *.wp6 *.wpc *.wpd *.wpf *.wpg *.wpj *.wpk *.wpm *.wpp *.wpt *.wpw *.wwl *.wwp *.wzs *.xl *.xla *.xlb *.xlc *.xld *.xlk *.xll *.xlm *.xls *.xlt *.xlv *.xlw # "Internet Settings" files -- shouldn't come from the outside *.ins *.isp # Outlook email/news archive file *.eml *.nws # "Multipurpose HTML archive" -- affected by vulnerabilities *.mht *.mhtml # HTTP-based database access -- not used by browsers *.idc *.htx # URL/Link files have no business being downloaded by browsers *.url *.lnk # Others *.reg *.inf          
Home > Screenshots > Dlink > DFL-1100 > Content Filtering - Edit URL Blacklist