Page 61 / 98 Scroll up to view Page 56 - 60
61
HITRON CVE-30360 USER’S GUIDE
FIREWALL
4.6.1
ADDING OR EDITING A PORT TRIGGERING RULE
To add a new port triggering rule, click
Add
in the
Firewall
>
Port Triggering
screen.
To edit an existing port triggering rule, select the rule’s radio button (
) in the
Firewall
>
Port Triggering
screen and click the
Edit
button.
The following screen displays.
FIGURE 21:
The Firewall > Port Triggering > Add/Edit Screen
Add New
Click this to define a new port triggering rule. See
Adding or Editing a Port Triggering Rule
on page
61
for
information on the screen that displays.
Edit
Select a port triggering rule’s radio button (
) and click
this to make changes to the rule. See
Adding or Editing
a Port Triggering Rule
on page
61
for information on the
screen that displays.
Delete
Select a port triggering rule’s radio button (
) and click
this to remove the rule. The deleted rule’s information
cannot be retrieved.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 20:
The Firewall > Port Triggering Screen
Page 62 / 98
62
HITRON CVE-30360 USER’S GUIDE
FIREWALL
The following table describes the labels in this screen.
TABLE 21:
The Firewall > Port Triggering > Add/Edit Screen
Application Name
Enter a name for the application for which you want to
create the rule.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
Trigger Port Range
Use these fields to specify the trigger ports. When the
CVE-30360 detects activity on any of these ports
originating from a computer on the LAN, it automatically
opens the
Target
ports in expectation of incoming traffic.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Target Port Range
Use these fields to specify the target ports. The CVE-
30360 opens these ports in expectation of incoming
traffic whenever it detects activity on any of the
Trigger
ports. The incoming traffic is forwarded to these ports on
the computer connected to the LAN.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol
Use this field to specify whether the CVE-30360 should
activate this trigger when it detects activity via:
Transmission Control Protocol (
TCP
)
User Datagram Protocol (
UDP
)
Transmission Control Protocol and User Datagram
Protocol (
Both
)
NOTE:
If in doubt, leave this field at its default (
Both
).
Timeout (ms)
Enter the time (in milliseconds) after the CVE-30360
opens the
Target
ports that it should close them.
Connected Computers
Click this to see a list of the computers currently
connected to the CVE-30360 on the LAN.
Back
Click this to return to the
Firewall
>
Forwarding
screen
without saving your changes to the port forwarding rule.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 63 / 98
63
PARENTAL CONTROL
5
PARENTAL CONTROL
This chapter describes the screens that display when you click
Parent Control
in the
toolbar.
5.1
PARENTAL CONTROL OVERVIEW
This section describes some of the concepts related to the
Parent Control
screens.
5.1.1
WEBSITE BLOCKING
The
Parent Control
screens allow you to block access from computers on the LAN to
certain websites, or websites whose URLs (website addresses) contain the keywords
you specify.
You can also specify “trusted” computers, which should be exempted from website
blocking, and you can schedule website blocking so that it is only in effect at certain
times (evenings and weekends, for example).
5.2
THE WEB SITE BLOCKING SCREEN
Use this screen to block access from the LAN to certain websites. You can also
specify trusted computers, which are not subject to the blocking filter.
NOTE:
To apply the blocking filter only at certain times, use the
Parent Control
>
Scheduling
screen.
Click
Parent Control
>
Web Site Blocking
. The following screen displays.
Page 64 / 98
64
HITRON CVE-30360 USER’S GUIDE
PARENTAL CONTROL
FIGURE 22:
The Parent Control > Web Site Blocking Screen
The following table describes the labels in this screen.
TABLE 22:
The Parent Control > Web Site Blocking Screen
Web Site Blocking Options
Enable Web Site
Blocking
Use this field to turn web site blocking on or off.
Select the checkbox to enable web site blocking.
Deselect the checkbox to disable web site blocking.
New Key Word/URL
Blocking
Use these fields to configure the websites to which users
on the LAN are denied access:
Enter a URL (for example, “www.example.com”) to
block access to that website only.
Enter a keyword (for example, “example”) to block
access to all websites that contain the keyword in
their URL (for example, “www.example.com”,
“www.example.org”, “www.someotherwebsite.com/
example” and so forth).
Click
Add
to add the URL or keyword to the
Blocked
Key Words/URLs
list.
Page 65 / 98
65
HITRON CVE-30360 USER’S GUIDE
PARENTAL CONTROL
5.3
THE SCHEDULING SCREEN
Use this screen to control when the website blocking filter should be in effect.
NOTE:
To configure the website blocking filter, use the
Parent Control
>
Web Site
Blocking
screen.
Click
Parent Control
>
Scheduling
. The following screen displays.
Blocked Key Words/
URLs
This displays the list of websites and keywords to which
users on the LAN are denied access.
Select a URL or keyword and click
Remove
to delete
it from the list.
Click
Clear List
to delete all the URLs and keywords
from the list.
Trusted Computers
New Computer MAC
Address
Enter a computer’s Media Access Control (MAC)
address and click
Add
to include it in the trusted
computer list.
Trusted Computer
List
This displays a list of the computers which are exempt
from the website blocking filter, identified by their MAC
addresses.
Connected
Computers
Click this to see a list of the computers that are currently
connected to the CVE-30360.
Remove
Select a computer’s MAC address from the
Connected
Computers
list and click this to delete it from the list.
Clear List
Click this to delete all the computers’ MAC addresses
from the list.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 22:
The Parent Control > Web Site Blocking Screen (continued)

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top