Page 66 / 104 Scroll up to view Page 61 - 65
66
4021196 Rev B
Control Access to the Gateway
Section
Field Description
Tod Filter
Add
Allows you to add a new Time of Day access filter or rule.
Enter the name of the filter and click the
Add
key to add the
filter to the list. Time of Day rules are used to restrict Internet
access based on the day and time.
Remove
Removes the selected filter from the Time of Day filter list
Schedule
Days to Block
Allows you to control access based on days of the week
Time to Block
Allows you to control access based on time of day
Access Restrictions > User Setup
Use the Access Restrictions User Setup page to set up additional accounts and user
profiles for household members. Each profile can be assigned customized levels of
Internet access as defined by the access rules assigned to that user's profile.
Important:
These additional accounts do not grant administrative access to the
gateway.
Note:
Once you define and enable user profiles, each user must sign-on each time
they wish to access the Internet. The user can sign-on when the pop-up sign-on
screen appears in their Web browser. The user must enter their correct user name
and password in order to gain Internet access.
Select the
User Setup
tab to open the Access Restrictions User Setup page.
Page 67 / 104
4021196 Rev B
67
Control Access to the Gateway
Access Restrictions User Setup Page Description
Use the descriptions and instructions in the following table to configure the user
setup for your residential gateway. After you make your selections, click
Save
Settings
to apply your changes or
Cancel Changes
to cancel.
Section
Field Description
User
Configure
Add User
Allows you to add a new user profile. Enter the name of the user and click the
Add User
button to add the user to the list.
User Settings
Allows you to edit a user profile by using the drop-down menu to edit a user profile. The
drop-down menu allows you to recall the profile to be edited. User names and passwords
are case-sensitive.
Make sure to check the
Enable
box to activate the user profile. If a profile is not active, that
user will not have any access to the Internet.
To remove a user profile, use the drop-down menu to select the user to be removed and
click the
Remove User
button.
Password
Enter the selected user's password in this field. Each user must enter their User Name and
Password each time they use the Internet. User names and passwords are case-sensitive.
Note:
The residential gateway will allow each user access to the Internet, subject to the
rules selected on this page for that user.
Re-Enter Password
Re-enter the same password for confirmation of the password in the previous field.
Trusted User
Check this box if the currently selected user is to be designated a trusted user. Trusted
users are not subject to Internet access rules.
Content Rule
Select the Content Rule for the current user profile. Content Rules must first be defined by
going to the Rules Configuration page. You can access the Rule Configuration page by
clicking on the “Basic Rules” tab on this page.
Time Access Rule
Select the Time Access Rule for the current user profile. Time Access Rules must first be
defined by going to the Time of Day Rules page. You can access the Time of Day Rules
page by clicking on the “Time of Day Rules” tab on this page.
Session Duration
1440 minutes [Factory default when a user is created. Otherwise, it is 0 (zero)].
Enter the amount of time in minutes that the user will be granted Internet access beginning
at the time they sign on using their User Name and Password.
Note:
Set the Session Duration to 0 (zero) to prevent session timeout.
Page 68 / 104
68
4021196 Rev B
Control Access to the Gateway
Section
Field Description
Inactivity Time
60 minutes [Factory default when a user is created. Otherwise, it is 0 (zero)].
Enter the amount of time during a user session where there is no Internet access activity,
indicating that the user is no longer online. If the inactivity timer is triggered, the user
session will be closed automatically. In order to regain Internet access, the user must log in
again with their User Name and Password.
Note:
Set the Inactivity time value to 0 (zero) to prevent session timeout.
Access Restrictions > Local Log
This page allows you to track, by user, any attempts made by that user to access
Internet sites that are restricted. From this page you can also view events captured
by the parental control event-reporting feature.
Select the
Local Log
tab to open the Access Restrictions Local Log page.
The following illustration is an example of the Access Restrictions Local Log page.
Section
Field Description
Local Log
Parental Control - Event
Log
Last Occurence
Displays the time of the most recent attempt to access a
restricted Internet site
Action
Displays the action taken by the system
Target
Displays the URL of the restricted site
User
Displays the user who attempted a restricted site
Source
Displays the IP address of the PC that was used when
attempting to access a restricted website
Page 69 / 104
4021196 Rev B
69
Configure Applications and Gaming
Configure Applications and Gaming
Overview
Most well-known Internet applications are supported by Application Layer
Gateways (ALGs). ALGs automatically adjust the gateway firewall to allow data to
pass without making any custom settings. We recommend that you test your
application before making changes in this section.
Applications & Gaming > Port Filtering
Use this window to configure transmission control protocol (TCP) and user
datagram protocol (UDP) port filters. These filters prevent a range of TCP/UDP
ports from accessing the Internet. You can also prevent PCs from sending outgoing
TCP/UDP traffic to the WAN on specific IP port numbers. This filter is not IP
address- or MAC address- specific. The system blocks the specified port ranges for
all PCs.
Select the
Port Filtering
tab to open the Applications & Gaming Port Filtering page.
Applications and Gaming Port Filtering Page Description
Use the descriptions and instructions in the following table to configure the port
filtering for applications and gaming features used on your residential gateway.
Click the
Enable
checkbox to enable port forwarding for the relevant application.
After you make your selections, click
Save Settings
to apply your changes or
Cancel
Changes
to cancel.
Page 70 / 104
70
4021196 Rev B
Configure Applications and Gaming
Section
Field Description
Port Filtering
Start Port:
This is the beginning of the port range. Enter the beginning of the
range of port numbers (external ports) used by the server or Internet
application. Check with the software documentation of the Internet
application for more information if necessary.
End Port:
This is the end of the port range. Enter the end of the range of port
numbers (external ports) used by the server or Internet application.
Check with the software documentation of the Internet application
for more information if necessary.
Protocol
Select one of the following protocols:
TCP
UDP
Both
Enable:
Check this box to enable filtering on the specified ports.
Applications & Gaming > Port Range Forwarding
Important:
The gateway normally implements a feature called Port Translation. Port
Translation monitors what ports are actually being used by your PCs or other
devices on your LAN. This monitoring provides an added level of security beyond
what the firewall provides. However, there are some applications that require the
gateway to use specific ports to connect over the Internet.
Use Port Range Forwarding to forward ports from the public Internet to specific IP
addresses in your local network. Select the
Port Range Forwarding
tab to open the
Applications & Gaming Port Range Forwarding page.
For the Start and End Port, select a port from the recommended 49152 - 65535 range.
Keep in mind that ports used are program specific so check which ones the program
requires to be forwarded. Type the port number or range in both boxes. In the IP
Address box type the name of the computer’s IP address to which this is to apply.
Note:
Port Range Forwarding continually exposes the selected ports to the public
Internet. This means that the gateway’s firewall is no longer active on these ports.
The device with the forwarding IP address can be exposed to hacker attacks while
the port range is being forwarded.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top