Security
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I though about using the router's "Filter Set Configuration" menu, but that only seems to be for ports.
Its a Zyxel Prestige 310 by the way.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Note that it doesn't have to be a existing IP just needs to be
a valid one in the eyes of your router.
Send it just use the last set of digits as an unused IP.
I manage networks for various companies and certain sites send people
to a personal web server on the network that displays a warning informing
the person that that page is off-limits, could sent them to yahoo or wherever.
If you wanted to block access to 61.51.41.21 you would type the following:
route ADD 61.51.41.21 MASK 255.255.255.255 <nonworking local IP for gateway>
For example, on my network 192.168.1.240 is valid but it is not used so I would enter:
route ADD 61.51.41.21 MASK 255.255.255.255 192.168.240
This would effectively block access to that IP address. However, if you reboot your system, this goes away. To make the route persistent across boots, add the "-p" switch as follows:
route -p ADD 61.51.41.21 MASK 255.255.255.255 192.168.240
When you do a "route print" you'll see this at the bottom of the output:
============
Persistent Routes:
Network Address Netmask Gateway Address Metric
161.58.201.64 255.255.255.255 192.168.1.240 1
============

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.