Page 61 / 108 Scroll up to view Page 56 - 60
Ubee Interactive
Using the Local Log Option
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
57
7.2
Using the Local Log Option
Use the
Local Log
to define firewall event log reporting through email alerts and report on
possible attacks on the system.
Steps
To define local log reporting:
1.
Click
Firewall
from the main menu.
2. Click
Local Log
from the left side menu. Field descriptions are listed below the screen
example.
Label
Description
IPv4 Firewall Protection
Defines the level of protection. Choices are Off, Low, Medium,
and High. Services are based on the protection level and
displayed in the Allowed Services window.
Port Scan Detection
When enabled, detects port scans that probe for available
ports and potentially use these ports to detect weakness in the
network.
Optimize for XBOX
When enabled, this feature stabilizes and improves video
streaming.
Apply
Saves changes.
Page 62 / 108
Ubee Interactive
Using the Remote Log Option
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
58
7.3
Using the Remote Log Option
Use the
Remote Log
option to define events and send the log to a local SysLog server.
Steps
To configure the firewall remote log:
1.
Click
Firewall
the main menu.
2. Click
Remote Log
from the left side menu. The
Remote Log
fields are explained
following this screen example.
Label
Description
Contact Email Address
Defines the email address where you want to send the log.
SMTP Server Name
Defines the name of the SMTP server, such as
smtp.example.com.
SMTP Username
Defines the username for the email address, such as
SMTP Password
Defines the password for the email address.
E-mail Alerts
Enables or disables log reporting.
Apply
Saves the settings and completes the setup.
E-mail Log
Sends the log to the specified email address.
Clear Log
Deletes the log.
Page 63 / 108
Ubee Interactive
Using the Remote Log Option
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
59
Label
Description
Permitted Connections
Logs all access attempts that are allowed by the firewall when
checked.
Blocked Connections
Logs all access attempts that are blocked by the firewall when
checked.
Known Internet Attacks
Logs all known attacks from the Internet when checked.
Product Configuration Events
When checked, logs when the DDW366 is configured/modified
by a user or administrator.
to SysLog server at 192.168.0.
Defines the IP address of the Syslog server.
Apply
Saves changes.
Page 64 / 108
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
60
8
Understanding the Access Control Menu
The Access Control menu allow you to control Internet access for users on the DDW366
network. It provides the following features:
Define user/password access.
Block specific Web sites and Web sites based on keywords.
Define the times users are allowed to access the Internet.
View a local log to view Internet activity.
Topics
See the following topics:
Using the User Setup Option on page 60
Using the Basic Option on page 62
Using the ToD Filter Option on page 64
Using the Local Log Option on page 66
Steps
To access the Access Control menu:
1.
Access the Web interface. Refer to
Accessing the Web User Interface Locally on page
16
.
2. Click the
Access Control
link from the top of the screen.
8.1
Using the User Setup Option
The
User Setup
option allows you to configure which user accounts can or cannot
connect to your wireless or wired network, and the parameters of each connection.
Steps
To configure user accounts:
1.
Click the
Access Control
link from the top of the screen.
2. The
User Setup
screen is displayed.
Field descriptions follow the screen shot below.
Note:
To enable Access Control, refer to
Using the Basic Option on page 62
.
Page 65 / 108
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
61
Label
Description
Add User
Remove User
Enable
Defines user accounts.
To add a new user, add the user name and click Add
User. The user becomes selectable in the User Settings
drop down menu.
To select an existing user, choose the user from the User
Settings drop down menu.
To activate the user, check Enable.
To remove a user, select the user from the User Settings
drop down menu and click Remove User.
Password
Defines the password for this user. It is required when this
user tries to access the Internet via the device.
Re-Enter Password
Confirms the password with the re-entered password.
Trusted User
Defines the selected user as a trusted user when enabled is
checked. The user is limited to timing and content when
visiting the Internet, as defined in the following fields.
Content Rule
Selects from the pop-up menu an existing content rule that
defines what kind of Websites the user can visit or not.
White List Access Only
Selects the White List Access option. If you have created a
content rule that defines a black list and white list, select the
White List Access Only checkbox to force the wireless modem
to execute the policy for the selected user.

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top