Page 86 / 114 Scroll up to view Page 81 - 85
Version 1.1, 08/2013. Copyright
2013 Hitron Technologies
86
Hitron CGN3 User’s Guide
6.6
Device Reset Screen
Use this screen to reboot your CGN3, or to return it to its factory default settings.
Click
Admin
>
Device Reset
. The following screen displays.
Figure 35:
The Admin: Device Reset Screen
SNTP Function
Use this field to select whether the
SNTP Function
be
active or not.
Select
Enabled
to activate the SNTP Function.
Select
Disabled
to deactivate the SNTP Function.
NOTE:
The Simple Network Time Protocol (SNTP)
is
an adaptation of the Network Time Protocol
(NTP) used to
synchronize computer clocks in
the Internet.
Time Zone
Use this fields to select the time zome when the SNTP
Function
enabled
.
Assign SNTP Server
Enter the
SNTP Server
you want to assign manually.
Daylight Function
Use this field to select whether the
Daylight Function
be
active or not.
Select
Enabled
to activate the Daylight Function.
Select
Disabled
to deactivate the Daylight Function.
Daylight Time
Enter the duration of the daylight time.
Table 32:
The Admin: Time Setting Screen (continued)
Page 87 / 114
Version 1.1, 08/2013. Copyright
2013 Hitron Technologies
87
Hitron CGN3 User’s Guide
The following table describes the labels in this screen.
Table 33:
The Admin: Device Reset Screen
Reboot Device
Click
Reboot
to restart your CGN3.
Restore Factory Default
Settings
Click
Factory Reset
to return your CGN3 to its factory
default settings.
When you do this, all your user-configured settings are
lost, and cannot be retrieved.
Help
Click this to see information about the fields in this screen.
Page 88 / 114
Version 1.1, 08/2013. Copyright
2013 Hitron Technologies
88
Hitron CGN3 User’s Guide
7
Security
This chapter describes the screens that display when you click
Security
in the
toolbar. It contains the following sections:
Security Overview
on page
88
The Firewall Screen
on page
90
The Service Filter Screen
on page
92
The Device Filter Screen
on page
97
The Keyword Filter Screen
on page
101
The Logs Screen
on page
103
The VPN Pass-Through Screen
on page
104
7.1
Security Overview
This section describes some of the concepts related to the
Security
screens.
7.1.1
Firewall
The term “firewall” comes from a construction technique designed to prevent the
spread of fire from one room to another. Similarly, your CGN3’s firewall prevents
intrusion attempts and other undesirable activity originating from the WAN, keeping
the computers on your LAN safe. You can also use filtering techniques to specify the
computers and other devices you want to allow on the LAN, and prevent certain traffic
from going from the LAN to the WAN.
Page 89 / 114
Version 1.1, 08/2013. Copyright
2013 Hitron Technologies
89
Hitron CGN3 User’s Guide
7.1.2
Intrusion detection system
An intrusion detection system monitors network activity, looking for policy violations,
and malicious or suspicious activity. The CGN3’s intrusion detection system logs all
such activity to the
Security
>
Logs
screen.
7.1.3
Device Filtering
Every networking device has a unique Media Access Control (MAC) address that
uniquely identifies it on the network. When you enable MAC address filtering on the
CGN3’s firewall, you can set up a list of devices, identified by their MAC addresses,
and then specify whether you want to:
Deny the devices on the list access to the CGN3 and the network (in which case
all other devices can access the network)
or
Allow the devices on the list to access the network (in which case no other
devices can access the network).
7.1.4
Service Filtering
Service filtering is a way of preventing users on the LAN from connecting with devices
on the WAN via specific services, protocols or applications. It achieves this by
permitting or denying traffic from the LAN to pass to the WAN, based on the target
port.
7.1.5
VPN
A virtual private network (VPN) extends a private network across a public network,
such as the Internet. It enables a computer to send and receive data across shared or
public networks as if it were directly connected to the private network, while
benefitting from the functionality, security and management policies of the private
network. This is done by establishing a virtual point-to-point connection through the
use of dedicated connections, encryption, or a combination of the two.
Page 90 / 114
Version 1.1, 08/2013. Copyright
2013 Hitron Technologies
90
Hitron CGN3 User’s Guide
7.2
The Firewall Screen
Use this screen to turn firewall features on or off and to allow or permit certain
applications and protocols. You can select the level of firewall protection from pre-
defined options, or create a custom protection profile.
NOTE:
To block specific ports, use the Service Filter screen (see
The Service Filter
Screen
on page
92
).
Click
Security
>
Firewall
. The following screen displays.
Figure 36:
The Security: Firewall Screen

Rate

3.5 / 5 based on 2 votes.

Popular Hitron Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top