Page 56 / 86 Scroll up to view Page 51 - 55
B
7 •
Firewall Pages
55
Firewall Remote Log Page
This page allows you to send firewall attack reports out to a standard SysLog server so
many instances can be logged over a long period of time. You can select individual attack
or configuration items to send to the SysLog server so that only the items of interest will
be monitored. You can log permitted connections, blocked connections, known Internet
attack types, and CMRG configuration events. The SysLog server must be on the same
network as the Private LAN behind the Configuration Manager (typically 192.168.0.x). To
activate the SysLog monitoring feature, check all desired event types to monitor and
enter the last byte of the IP address of the SysLog server. Normally, the IP address of
this SysLog server would be hard-coded so that the address does not change and always
agrees with the entry on this page.
Field Description for the Firewall Remote Log Page
Field
Description
Permitted Connections
Check for the server to e-mail you logs of who is connecting
to your network.
Blocked Connections
Check for the server to e-mail you logs of who is blocked
from connecting to your network.
Known Internet Attacks
Check for the server to e-mail you logs of known Internet
attacks against your network.
Product Configuration Events
Check for the server to e-mail you logs of the basic product
configuration events logs.
To SysLog server at 192.168.0.
Enter the last digits from 10 to 254 of your SysLog server’s
IP address.
When done, click
Apply
.
Page 57 / 86
B
8 •
Parental Control Pages
56
8
Parental Control Pages
The SBG901 Parental Control Pages allow you to configure access restrictions to a
specific device connected to the SBG901 LAN.
You can click any Parental Control submenu option to view or change the
configuration information for that option.
Parental Control User Setup Page
This page is the master page. Each user is linked to a specified time access rule, content
filtering rule, and login password to get to the filtered content. You may also specify a
user as a “trusted user,” which means that person will have access to all Internet
content regardless of the filters that you define. You can use the Trusted User checkbox
as a simple override to grant a user full access, while storing all of the filtering settings
for easy availability.
You can also enable Internet session duration timers, which set a limited amount of time
for Internet access from the rules you select. The user must enter their password only
the first time to access the Internet. It is not necessary to enter the password each time
a new web page is accessed. In addition, there is a password inactivity timer. If there is
no Internet access for the specified time in minutes, the user must login again. These
timed logins ensure that a specific user uses the Internet gateway appropriately.
Page 58 / 86
B
8 •
Parental Control Pages
57
Field Descriptions for the Parental Control User Setup Page
Field
Description
Add User
Adds a user to set the parental controls for a specific user.
User Settings
Select the user for whom you want to modify access
restrictions.
Checkmark
Enable
to select the user.
Click
Remove User
to delete the user from Parental Controls.
Password
Enter a user password to log onto the Internet.
Re-Enter Password
Enter the password again for confirmation.
Trusted User
The selected user will have full access to Internet content, thus
overriding any set filters.
Checkmark
Enable
to override set filters without having to turn
off filter settings.
Content Rule
Used to specify which websites a selected user is allowed to
access.
Check
White List Access Only
and choose a user from the
drop-down list.
Time Access Rule
You can choose a rule that restricts when a selected user can
use the Internet.
Session Duration
You can set the amount of time a selected user can use the
Internet.
Inactivity time
You can set the amount of inactivity time before the Internet
automatically closes for a selected user.
Trusted Computers
You can enter a selected user’s CPE MAC address so that CPE
can access the Internet without being censored by the Parental
Control.
When done entering the MAC address, click
Add.
When done, click
Apply
to activate and save any changes you made.
Page 59 / 86
B
8 •
Parental Control Pages
58
Parental Control Basic Setup Page
This page allows you to set rules to block certain kinds of Internet content and certain
Web sites.
After you have changed your Parental Control settings, click the appropriate
Apply
,
Add
,
or
Remove
button.
Click
Refresh
in your web browser window to view your current settings.
Page 60 / 86
B
8 •
Parental Control Pages
59
Parental Control Time of Day Access Policy Page
This
page allows you to block all Internet traffic to and from specified devices on your
SBG901 network based on the day and time settings you specify. You can set policies to
block Internet traffic for the entire day or just certain time periods within each day for
specific users. You can add up to 30 eight-character categories (filter names) with
different day and time settings. You enter a name for each time filter in the
Add New
Policy
field. Any time filter for Internet access can be enabled or disabled at any time.
The time filters for limited Internet access are applied for each user in the
Time Access
Rule
field on the
Parental Control User Setup Page
.
Once each category change has been made, the user must click
Apply
at the bottom of
the page to store and activate the settings. These same category names for blocking
profiles show up in the Parental Control section on the User Setup page in the “Time
Access Rules” section. On that page, each user can be assigned up to four of these
categories simultaneously.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top