Page 46 / 68 Scroll up to view Page 41 - 45
38
5 INTERNET SECURITY
DMS-CTC-20130228-0000 v1.0
5.1.3 Manage devices
On the
Managed Devices
page you can:
Create a device rule to prevent a devices from accessing your network.
Mark computers as trusted. For trusted computers all service rules will be ignored.
Procedure
1
Browse to the Admin Tool.
For more information, see
“Accessing the Admin Tool” on page 25
.
2
On the
Parental Control
menu, click
Managed Devices
.
3
In the
Enable Managed Devices
list, click
Enable
.
4
In the
Access Type
list, click:
Allow All
to allow all devices by default. In this case you have to create a rule for each device that you want to block on
your network.
Block All
to block all devices by default. In this case you have to create a rule for each device that you want to allow on
your network.
Adding allowed devices
If you selected
Block All
in the
Access Type
list, proceed as follows:
1
In the
Allowed Devices
table, click
+ADD ALLOWED DEVICE
.
2
The
Add Device to be Allowed
page appears.
3
Under
Set Allowed Device
, select your device from the
Learned Device(s)
list. If your device is not listed, enter the
computer name and MAC address under
Custom Device
.
4
If you want this rule only to be applied at specific time frames, click
No
in the
Always Allow
list and define when to apply
the rule:
a
Under
Set Allow Time
, enter a start time and end time
b
Under
Set Allow Days
, select the days for which the selected block time should be applied.
5
Click
SAVE
.
Adding blocked devices
If you selected
Allow All
in the
Access Type
list, proceed as follows:
1
In the
Blocked Devices
table, click
+ADD BLOCKED DEVICE
.
2
The
Add Device to be Blocked
page appears.
3
Under
Set Blocked Device
, select your device from the
Learned Device(s)
list. If your device is not listed, enter the
computer name and MAC address under
Custom Device
.
4
If you want this rule only to be applied at specific time frames, click
No
in the
Always Block
list and define when to apply
the rule:
a
Under
Set Block Time
, enter a start time and end time.
Optionally, you can provide a time schedule for a rule. The rule will only be activated within the specified time
frame.
If you want to have different time schedules depending on the day, you have to group them in separate rules:
One rule for weekdays (for example, block the device from 10:00 PM until 8:00 PM)
One rule for the weekend (for example, block the device from 10:00 PM until 8:00 AM).
Page 47 / 68
39
5 INTERNET SECURITY
DMS-CTC-20130228-0000 v1.0
b
Under
Set Block Days
, select the days for which the selected block time should be applied.
5
Click
SAVE
.
If you want to have different time schedules depending on the day, you have to group them in separate rules:
One rule for weekdays (for example, allow the device from 8:00 PM until 10:00 PM)
One rule for the weekend (for example, allow the device from 8:00 AM until 10:00 PM).
Page 48 / 68
40
5 INTERNET SECURITY
DMS-CTC-20130228-0000 v1.0
5.1.4 View parental control reports
Introduction
The
Reports
page allows you to generate reports on possible infringements of the parental control rules.
Procedure
1
Browse to the Admin Tool.
For more information, see
“Accessing the Admin Tool” on page 25
.
2
On the
Parental Control
menu, click
Reports
.
3
The
Report
page appears.
Under
Report Filters
, select a report type and time frame and click
GENERATE REPORT
.
4
The
Generated report
table now lists all log entries.
5
Optionally, you can:
Click
PRINT
to print the log entries.
Click
DOWNLOAD
to save the log entries as a text file.
Page 49 / 68
41
5 INTERNET SECURITY
DMS-CTC-20130228-0000 v1.0
5.2 Firewall
Introduction
The Gateway comes with an integrated firewall that helps you protect your network from attacks from the Internet. This
firewall has a number of predefined levels to allow you to adjust the firewall to your needs.
The default Firewall setting is
Minimum Security (Low)
. This means that
all
traffic passing through the Gateway (from and
to the Internet) is allowed.
Predefined security levels
The Gateway has a number of predefined security levels. The following levels are available:
Maximum Security (High)
:
Blocks all the applications including voice applications (such as Gtalk, Skype) and P2P applications. Allows Internet
browsing, email, VPN, DNS and iTunes services.
Typical Security (Medium):
Blocks P2P applications and Ping to the Gateway, allows all other traffic.
Minimum Security (Low)
:
Allows all secure applications. This is the default configuration.
Custom Security
:
Allows you to create your own security level.
Changing the security level
Proceed as follows:
1
Browse to the Admin Tool.
For more information, see
“Accessing the Admin Tool” on page 25
.
2
On the
Gateway
menu, click
Firewall
.
3
The
Firewall
page appears.
Under
Firewall Security Level
, select one of the predefined levels or select
Custom Security
to create a custom level.
4
Click
SAVE SETTINGS
.
Although BlockAll will block all connections, some mandatory types of traffic such as DNS will still be relayed
between LAN and WAN by the Gateway.
The firewall levels only have impact on traffic passing through your Gateway. This means that the handling of traffic
directly appointed from and to the Gateway is independent of the selected firewall level.
Page 50 / 68
42
5 INTERNET SECURITY
DMS-CTC-20130228-0000 v1.0

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top