Page 41 / 50 Scroll up to view Page 36 - 40
Ambit Broadband
Users Guide
41
White List Access Only
Suppose admin has created a content rule which defined black
list and while list. Then admin can sele
ct “White List Access
Only” checkbox to force to execute the policy to the selected
user.
Time Access Rule
Select a defined time access rule to apply to the selected user.
Session Duration
This will trigger wireless router to disable this privilege after
expiration.
Inactivity time
Define the time out value when user has no activity with his
visiting to Internet.
Apply
Click to save.
Trusted Computers
Define the trusted host that will bypass the Parental Control
Process.
Add
Input the trusted host’s
MAC address. And click to save.
Remove
Click to delete the selected MAC record.
7.4.2 Activation
This page allows basic selection of rules which block certain Internet content and certain Web sites.
When you change your Parental Control settings, you must click on the appropriate "Apply", "Add"
or "Remove" button for your new settings to take effect. If you refresh your browser's display, you
will see the currently active settings.
Label
Description
Enable Parental Control
Enable the checkbox to active the Parental Control feature.
Page 42 / 50
Ambit Broadband
Users Guide
42
Apply
Click to save.
Content Policy
Configuration
Configure content policy configuration.
Add New Policy
Input rule name and click to create a new policy.
Content Policy List
Allow admin to select
a certain policy rule.
Remove Policy
Click to delete the selected policy rule.
Keyword List
URL key word list that’s used to be used.
Add Keyword
Click to insert a new keyword.
Remove Keyword
Click to delete an existing keyword.
Blocked Domain List
Domain list that’s to be blocked.
Add
Domain
Click to add a new domain.
Remove Domain
Click to delete an existing domain
Allowed Domain List
White list, which allows users to visit.
Add Allowed Domain
Click to insert new white list.
Remove Allowed Domain
Click to delete the selected URL list.
7.4.3 TOD Filter
This page allows configuration of time access policies to block all internet traffic to and from specific
network devices based on time of day settings.
Page 43 / 50
Ambit Broadband
Users Guide
43
Label
Description
Add New Policy
Input policy name, and click Add new Policy button to
create a new Time Policy rule.
Time Access Policy List
Allow admin to select time policy rule to enable or remove
a selected rule.
Enable
Select the checkbox to active this time policy rule,
unselect the checkbox to disable this rule.
Remove
Click to delete a selected rule.
Days to Block
Select the day that this time policy rule limited user to visit
Internet.
Time to Block
Define the detailed time for this policy rule.
All Day
Select All Day to eliminate any chance for access within
the day blocked.
Apply
Click to save.
7.4.4 Event Log
This page displays Parental Control event log reporting.
Label
Description
Last Occurrence
Display the time when the last event occurred.
Action
Display what’s done by parental control, drop or permit an access
request.
Target
Display the destination IP address of a certain access request.
User
Display the user who triggered this event log.
Page 44 / 50
Ambit Broadband
Users Guide
44
Source
Display the source IP address of this event.
Note: Parental Control Flow
7.5 Firewall
Originally, the term firewall referred to a construction technique designed to prevent the spread of
fire from one room to another. The networking term firewall is a system or group of systems that
enforces an access-control policy between two networks. It may also be defined as a mechanism
used to protect a trusted network from an untrusted network. Of course, firewalls cannot solve all of
the security problems. A firewall is one of the mechanisms used to establish a network security
perimeter in support of a network security policy. It should never be the only mechanism or method
employed. For a firewall to guard effectively, you must design and deploy it appropriately. This
requires integrating the firewall into a broad information-security policy. In addition, specific policies
must be implemented within the firewall itself.
Page 45 / 50
Ambit Broadband
Users Guide
45
7.5.1 Content Filter
This page allows certain Web-oriented cookies, java scripts, and pop-up windows to be blocked by
the firewall. A list of "trusted computers" can also be defined that are not subject to any filters
configured. Specific Firewall features can also be enabled. It is highly recommended that the
Firewall is left enabled at all times for protection against Denial of Service attacks. Go to the
Parental Control page to block internet access to specific sites.
7.5.2 Content Filter
This page allows certain Web-oriented cookies, java scripts, and pop-up windows to be blocked by
the firewall. A list of "trusted computers" can also be defined that are not subject to any filters
configured. Specific Firewall features can also be enabled. It is highly recommended that the
Firewall is left enabled at all times for protection against Denial of Service attacks. Go to the
Parental Control page to block internet access to specific sites.
Label
Description
Content Filter Settings
Filter Proxy
A server that acts as an intermediary between a user and the
Internet to provide security, administrative control, and caching
service. When a proxy server is located on the WAN it is possible for
LAN users to circumvent content filtering by pointing to this proxy
server.
Filter Cookies
Cookies are files stored on a computer’s hard dr
ive. Some web
servers use them to track usage and provide service based on ID.
Filter Java Applets
Java is a programming language and development environment for
building downloadable Web components or Internet and intranet
business applications of all kinds.

Rate

4.5 / 5 based on 2 votes.

Popular Ambit Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top