Page 71 / 113 Scroll up to view Page 66 - 70
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
71
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
71
HITRON CGN2 USER’S GUIDE
4.5.1
ADDING OR EDITING A PORT TRIGGERING RULE
To add a new port triggering rule, click
Add
in the
Firewall
>
Port Triggering
screen.
To edit an existing port triggering rule, select the rule’s radio button (
) in the
Firewall
>
Port Triggering
screen and click the
Edit
button.
The following screen displays.
Figure 22:
The Firewall > Port Triggering > Add/Edit Screen
The following table describes the labels in this screen.
Table 22:
The Firewall > Port Triggering > Add/Edit Screen
Application Name
Enter a name for the application for which you want to
create the rule.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
Trigger Port Range
Use these fields to specify the trigger ports. When the
CGN2 detects activity on any of these ports originating
from a computer on the LAN, it automatically opens the
Target
ports in expectation of incoming traffic.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Page 72 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
72
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
72
HITRON CGN2 USER’S GUIDE
4.6
THE DMZ SCREEN
Use this screen to configure your network’s Demilitarized Zone (DMZ).
NOTE:
Only one device can be on the DMZ at a time.
Target Port Range
Use these fields to specify the target ports. The CGN2
opens these ports in expectation of incoming traffic
whenever it detects activity on any of the
Trigger
ports.
The incoming traffic is forwarded to these ports on the
computer connected to the LAN.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol
Use this field to specify whether the CGN2 should
activate this trigger when it detects activity via:
Transmission Control Protocol (
TCP
)
User Datagram Protocol (
UDP
)
Transmission Control Protocol and User Datagram
Protocol (
Both
)
NOTE:
If in doubt, leave this field at its default (
Both
).
Timeout (ms)
Enter the time (in milliseconds) after the CGN2 opens
the
Target
ports that it should close them.
Connected Computers
Click this to see a list of the computers currently
connected to the CGN2 on the LAN.
Back
Click this to return to the
Firewall
>
Forwarding
screen
without saving your changes to the port forwarding rule.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Table 22:
The Firewall > Port Triggering > Add/Edit Screen
Page 73 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
73
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
73
HITRON CGN2 USER’S GUIDE
Click
Firewall
>
DMZ
. The following screen displays.
Figure 23:
The Firewall > DMZ Screen
The following table describes the labels in this screen.
Table 23:
The Firewall > DMZ Screen
Enable DMZ Host
Use this field to turn the DMZ on or off.
Select the checkbox to enable the DMZ.
Deselect the checkbox to disable the DMZ.
Computers that were previously in the DMZ are now
on the LAN.
Connected Computers
Click this to see a list of the computers currently
connected to the CGN2 on the LAN. To add a
connected computer to the DMZ, click its
Add
button
and click
Apply
in the screen that displays.
[...] IP Address [...]
Enter the IP address of the computer that you want to
add to the DMZ.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 74 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
74
HITRON CGN2 USER’S GUIDE
5
PARENTAL CONTROL
This chapter describes the screens that display when you click
Parent Control
in the
toolbar. It contains the following sections:
Parental Control Overview
on page
74
The Website Blocking Screen
on page
75
The Scheduling Screen
on page
77
The Email / Syslog Alert Screen
on page
79
5.1
PARENTAL CONTROL OVERVIEW
This section describes some of the concepts related to the
Parental Control
screens.
5.1.1
WEBSITE BLOCKING
The
Parental Control
screens allow you to block access from computers on the LAN
to certain websites, or websites whose URLs (website addresses) contain the
keywords you specify.
You can also specify “trusted” computers, which should be exempted from website
blocking, and you can schedule website blocking so that it is only in effect at certain
times (evenings and weekends, for example).
Page 75 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
75
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
75
HITRON CGN2 USER’S GUIDE
5.2
THE WEBSITE BLOCKING SCREEN
Use this screen to block access from the LAN to certain websites. You can also
specify trusted computers, which are not subject to the blocking filter.
NOTE:
To apply the blocking filter only at certain times, use the
Parental Control
>
Scheduling
screen.
Click
Parental Control
>
Web Site Blocking
. The following screen displays.
Figure 24:
The Parental Control > Web Site Blocking Screen

Rate

3.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top