Page 66 / 106 Scroll up to view Page 61 - 65
66
HITRON BVW-3653 USER’S GUIDE
PARENTAL CONTROL
FIGURE 26:
The Parent Control > Scheduling Screen
The following table describes the labels in this screen.
TABLE 26:
The Parent Control > Scheduling Screen
Days of the Week
Select the days of the week on which you want the
website blocking filter to be in effect.
Time of Day
Use these fields to control the time that the website
blocking filter should be in effect:
±
Select
All Day
to apply the website blocking filter at
all times.
±
To apply the website blocking filter only at certain
times of day, deselect
All Day
. Use the
Start
fields
to define the time that the filter should come into
effect, and use the
End
fields to define the time that
the filter should cease being in effect.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 67 / 106
67
HITRON BVW-3653 USER’S GUIDE
PARENTAL CONTROL
5.4
THE LOCAL LOGS SCREEN
Use this screen to see information about events that have triggered the website
blocking filter.
Click
Parent Control
>
Local Logs
. The following screen displays.
FIGURE 27:
The Parent Control > Local Logs Screen
The following table describes the labels in this screen.
TABLE 27:
The Parental Control > Local Logs Screen
WAN Activity
This field displays information about website blocking
filter events in the following format:
±
Date (DD/MM/YY)
±
Time (HH:MM:SS)
±
IP Address
±
Event type
Clear
Click this to remove the log events. Deleted information
cannot be retrieved.
Refresh Logs
Click this to reload the information in the
WAN Activity
list. Events that have occurred since you last refreshed
the list display.
Page 68 / 106
68
HITRON BVW-3653 USER’S GUIDE
PARENTAL CONTROL
Page 69 / 106
69
WIRELESS
6
WIRELESS
This chapter describes the screens that display when you click
Wireless
in the
toolbar.
6.1
WIRELESS OVERVIEW
This section describes some of the concepts related to the
Wireless
screens.
6.1.1
WIRELESS NETWORKING BASICS
Your BVW-3653’s wireless network is part of the Local Area Network (LAN), known
as the Wireless LAN (WLAN). The WLAN is a network of radio links between the
BVW-3653 and the other computers and devices that connect to it.
6.1.2
ARCHITECTURE
The wireless network consists of two types of device: access points (APs) and
clients.
±
The access point controls the network, providing a wireless connection to each
client.
±
The wireless clients connect to the access point in order to receive a wireless
connection to the WAN and the wired LAN.
The BVW-3653 is the access point, and the computers you connect to the BVW-3653
are the wireless clients.
6.1.3
WIRELESS STANDARDS
The way in which wireless devices communicate with one another is standardized by
the Institute of Electrical and Electronics Engineers (IEEE). The IEEE standards
pertaining to wireless LANs are identified by their 802.11 designation. There are a
variety of WLAN standards, but the BVW-3653 supports the following (in order of
adoption - old to new - and data transfer speeds - low to high):
±
IEEE 802.11b
±
IEEE 802.11g
Page 70 / 106
70
HITRON BVW-3653 USER’S GUIDE
WIRELESS
±
IEEE 802.11n
6.1.4
SERVICE SETS AND SSIDS
Each wireless network, including all the devices that comprise it, is known as a
Service Set.
NOTE:
Depending on its capabilities and configuration, a single wireless access point
may control multiple Service Sets; this is often done to provide different
service or security levels to different clients.
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP. You can configure the BVW-3653 to broadcast the SSID (in which case, any
client who scans the airwaves can discover the SSID), or to “hide” the SSID (in which
case it is not broadcast, and only users who already know the SSID can connect).
6.1.5
WIRELESS SECURITY
Radio is inherently an insecure medium, since it can be intercepted by anybody in the
coverage area with a radio receiver. Therefore, a variety of techniques exist to control
authentication (identifying who should be allowed to join the network) and encryption
(signal scrambling so that only authenticated users can decode the transmitted data).
The sophistication of each security method varies, as does its effectiveness. The
BVW-3653 supports the following wireless security protocols (in order of
effectiveness):
±
WEP
(the Wired Equivalency Protocol): this protocol uses a series of “keys” or
data strings to authenticate the wireless client with the AP, and to encrypt data
sent over the wireless link. WEP is a deprecated protocol, and should only be
used when it is the only security standard supported by the wireless clients.
WEP provides only a nominal level of security, since widely-available software
exists that can break it in a matter of minutes.
±
WPA-PSK
(WiFi Protected Access - Pre-Shared Key): WPA was created to
solve the inadequacies of WEP. There are two types of WPA: the “enterprise”
version (known simply as WPA) requires the use of a central authentication
database server, whereas the “personal” version (supported by the BVW-3653)
allows users to authenticate using a “pre-shared key” or password instead.
While WPA provides good security, it is still vulnerable to “brute force”
password-guessing attempts (in which an attacker simply barrages the AP with
join requests using different passwords), so for optimal security it is advised that
you use a random password of thirteen characters or more, containing no
“dictionary” words.
±
WPA2-PSK
: WPA2 is an improvement on WPA. The primary difference is that
WPA uses the Temporal Key Integrity Protocol (TKIP) encryption standard
(which has been shown to have certain possible weaknesses), whereas WPA2
uses the stronger Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP),

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top