Page 66 / 98 Scroll up to view Page 61 - 65
66
HITRON CVE-30360 USER’S GUIDE
PARENTAL CONTROL
FIGURE 23:
The Parent Control > Scheduling Screen
The following table describes the labels in this screen.
TABLE 23:
The Parent Control > Scheduling Screen
Days of the Week
Select the days of the week on which you want the
website blocking filter to be in effect.
Time of Day
Use these fields to control the time that the website
blocking filter should be in effect:
Select
All Day
to apply the website blocking filter at
all times.
To apply the website blocking filter only at certain
times of day, deselect
All Day
. Use the
Start
fields
to define the time that the filter should come into
effect, and use the
End
fields to define the time that
the filter should cease being in effect.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 67 / 98
67
HITRON CVE-30360 USER’S GUIDE
PARENTAL CONTROL
5.4
THE LOCAL LOGS SCREEN
Use this screen to see information about events that have triggered the website
blocking filter.
Click
Parent Control
>
Local Logs
. The following screen displays.
FIGURE 24:
The Parent Control > Local Logs Screen
The following table describes the labels in this screen.
TABLE 24:
The Parental Control > Local Logs Screen
WAN Activity
This field displays information about website blocking
filter events in the following format:
Date (DD/MM/YY)
Time (HH:MM:SS)
IP Address
Event type
Clear
Click this to remove the log events. Deleted information
cannot be retrieved.
Refresh Logs
Click this to reload the information in the
WAN Activity
list. Events that have occurred since you last refreshed
the list display.
Page 68 / 98
68
HITRON CVE-30360 USER’S GUIDE
PARENTAL CONTROL
Page 69 / 98
69
WIRELESS
6
WIRELESS
This chapter provides an introduction to wireless networking, describes some
common wireless network setup procedures, and documents the screens that display
when you click
Wireless
in the toolbar. It contains the following sections:
Wireless Basics
on page
69
: this section describes how wireless networks work
and are secured.
Wireless Tutorials
on page
71
: this section describes how to perform some
common wireless network configuration tasks using your CVE-30360.
Advanced Wireless Networking
on page
74
: this section provides more in-depth
information.
If you are just interested in setting up your wireless network in a standard
configuration you do not need to read this section.
The Wireless Screens
on page
76
: this section provides detailed information on
each of the CVE-30360’s wireless screens.
Use this section as a reference to find out about a particular screen or field.
6.1
WIRELESS BASICS
This section describes how wireless networks and wireless security work.
Your CVE-30360’s wireless network is part of the Local Area Network (LAN), known
as the Wireless LAN (WLAN). The WLAN is a network of radio links between the
CVE-30360 and the other computers and devices that connect to it.
In the following figure, the wireless network is the part in the circle. The laptop and the
PC are called “wireless clients” and connect to the CVE-30360, which is called the
“access point” or “AP”. The wireless clients can use the AP to access other devices
(such as the printer) or the Internet.
Page 70 / 98
70
HITRON CVE-30360 USER’S GUIDE
WIRELESS
FIGURE 25:
Example Wireless Network
6.1.1
WIRELESS STANDARDS
The way in which wireless devices communicate with one another is standardized by
the Institute of Electrical and Electronics Engineers (IEEE). The IEEE standards
pertaining to wireless LANs are identified by their 802.11 designation. There are a
variety of WLAN standards, but the CVE-30360 supports the following (in order of
adoption - old to new - and data transfer speeds - low to high):
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
6.1.2
SERVICE SETS AND SSIDS
Each wireless network, including all the devices that comprise it, is known as a
“Service Set”.
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP.
You can configure the CVE-30360 to broadcast the SSID (in which case, any client
who scans the airwaves can discover the SSID), or to “hide” the SSID (in which case
it is not broadcast, and only users who already know the SSID can connect). See
Hiding the Network
on page
73
for more information.

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top