Page 56 / 101
Scroll up to view Page 51 - 55
51
Remove a Device from the Trusted Device List
To remove a device from the Trusted Device List, follow these steps:
➊
Click on the device in the Trusted Device List to select it.
➋
Click
Delete Device
.
Connected Devices
•
Hostname
— The network name for the connected device (if available).
•
Date/Time
— The date/time the device was detected by the network.
•
MAC Address
— The MAC address for the connected device.
NOTE
The MAC address on the Windows operating system is called the
Physical Address
.
•
IP Address
— The IP address for the connected device.
•
IP Type
— This can be
DHCP
if the IP address came from MiFi 4620L, or
ARP
if the ARP
protocol was used.
Buttons
•
Save
— Click this button to save any changes made to MAC Filtering.
•
Cancel
— Click this button to cancel any changes made to MAC Filtering.
Page 57 / 101
52
Port Filtering
The Port Filtering screen allows you to block outgoing Internet connections. You can set a list of
Allowed Applications to only allow certain programs to connect to the Internet. The Port Filtering
screen has the following sections:
•
Port Filtering
(See
Port Filtering
on page 53.)
•
Allowed Applications
(See
Allowed Applications
on page 53.)
•
Custom Applications
(See
Custom Applications
on page 54.)
Page 58 / 101
53
Port Filtering
The
Enable Port Filtering
checkbox enables or disables the Port Filtering feature.
•
When the feature is
enabled
(checked), you must select a port filtering application in the
Allowed Applications list to allow that application to connect to the Internet. For example, if
you select VPN in the Allowed Applications list but do not select HTTP, you can connect to a
VPN server but you cannot connect to a web page using your Internet browser.
•
When the feature is
disabled
(un-checked), any application can connect to the Internet.
Allowed Applications
Enable each port filtering application that needs to be able to access the Internet. When port
filtering is enabled, all other applications are blocked.
Page 59 / 101
54
Custom Applications
This page is only available when the Port Filtering feature is enabled.
Click
Custom Applications
to open the Custom Port Filtering screen. You can define and enable
custom Port Filtering applications. You need to know details of the traffic used and generated by the
applications you wish to define.
The Custom Port Filtering screen uses check boxes to enable port filtering for custom applications.
Similar to the Allowed Applications list, you must enable custom applications so they can connect
to the Internet.
Page 60 / 101
55
Port Ranges
You can define up to six port ranges for each application. Each port range has the following options:
•
Start Port
— Type the beginning of the range of port numbers used by outgoing traffic
for this application. Use as many rows as necessary to define the required number of port
ranges. Unused rows can be left blank.
•
End Port
— Type the end of the range of port numbers. If the port is a single port instead of a
range, type the same value for both the Start Port and the End Port.
•
Protocol
— For each port range (each row), select the protocol (TCP, UDP, or both) used by
that port range.
You can define all of your applications before you click
Save
to save your changes.
Use the
Ports
and
Hide
links to open and close the Port Definition Panel so you can define the ports
for each application as needed.
Buttons
•
Save
— Click this button to save changes made to the applications and/or port ranges.
•
Cancel
— Click this button to discard changes made to the applications and/or port ranges.