Page 66 / 108 Scroll up to view Page 61 - 65
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
62
8.2
Using the Basic Option
The
Basic
option allows you to select rules to block certain Internet content and Web
sites. After you change your Access Control settings, click the appropriate Apply, Add, or
Remove button for your new settings to take effect. Refresh your browser’s display to see
the currently active settings.
Steps
To filter Internet content and Web sites:
1.
Click the
Access Control
link from the top of the screen.
2. Click
Basic
from the left side of the screen. The
Basic
fields are explained following
this screen example.
Time Access Rule
Selects a defined time access rule to apply to the selected
user.
Session Duration
Allows you to enter a time in minutes for the user’s session to
expire. When the session expires, the user can log in again for
the same session duration.
Inactivity Time
Allows you to enter the time out value when a user has no
activity on the Internet. When the time expires, the user
interface to the Internet is canceled.
Apply
Saves all changes when clicked.
Trusted Computers
Defines the trusted hosts that can bypass the Access Control
Process.
Add
Adds the trusted host’s MAC address entered in the given
area and Add is clicked.
Remove
Removes a trusted computer from the list when it is
highlighted and Remove is clicked.
Label
Description
Page 67 / 108
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
63
Label
Description
Enable Access Control
Activates the Access Control feature when checked.
Apply
Saves all changes in the screen and activates Access Control,
if enabled.
Content Policy Configuration
Add New Policy
Adds a policy to the Policy List. Enter the policy name and
click Add New Policy. The policy then becomes selectable in
the Content Policy List drop down menu.
Content Policy List
Lists existing policies you can choose to use.
Remove Policy
Deletes a policy from the list. Select the policy from the
Content Policy List drop down menu and click Remove Policy.
Keyword List
Displays keywords you can use to block Web site addresses
(URLs) containing those words.
Add Keyword
Adds a keyword to the keyword list. Enter the word in the field
next to the Add Keyword button and click Add Keyword. The
keyword is added to the Keyword List.
Page 68 / 108
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
64
8.3
Using the ToD Filter Option
The
ToD
(Time of Day)
Filter
option allows the configuration of time-based access
policies to block all Internet traffic at specified times.
Steps
To configure ToD filters:
1.
Click the
Access Control
link from the top of the screen.
2. Click
ToD Filter
from the left side of the screen. The
ToD Filter
fields are explained
following this screen example.
Remove Keyword
Removes a keyword from the keyword list. Select the keyword
from the Keyword List, and click Remove Keyword.
Blocked Domain List
Displays Web domains (for example, unwanted.com) you can
use to block access to those domains.
Add Domain
Adds a domain to the Blocked Domain List. Enter a domain in
the field next to the Add Domain button, and click Add Domain.
Remove Domain
Removes a domain from the Blocked Domain List. Select the
domain from the Blocked Domain List, and click Remove
Domain.
Allowed Domain List
Displays domains you want to allow access to.
Add Allowed Domain
Adds allowed domains to the list. Enter the name in the field
next to Add Allowed Domain and click Add Allowed Domain.
Remove Allowed Domain
Removes domain names from the Allowed Domain List.
Highlight the domain from the list and click Remove Allowed
Domain.
Override Password
If you encounter a blocked website, you can override the block
by entering a password.
Password
Enter a password for overriding blocked websites.
Re-Enter Password
Re-enter the password.
Access Duration
Set a time duration (in minutes) for access to the blocked site
when the block has been overridden by entering the password.
Apply
Saves the password and access duration time.
Label
Description
Page 69 / 108
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
65
Label
Description
Add New Policy
Adds a new policy. Enter a policy name in the field next to Add
New Policy, and click the Add New Policy button. The policy
then becomes selectable in the Time Access Policy List drop
down menu.
Time Access Policy List
Lists the existing policies in a drop-down menu.
Enabled
Activates a policy. Select the policy from the Time Access
Policy List drop-down menu and check Enabled.
Remove
Deletes a policy. Select the policy from the Time Access Policy
List drop-down menu and click Remove.
Days to Block
Allows you to select the days to block Internet access.
Time to Block:
All Day or a specific time frame
Allows you to define the times of day to block.
To block all day, check All Day to eliminate all access
during the days selected.
To define a specific time frame to block Internet access for
the days selected, enter the Start time and the End time.
Select AM or PM for each.
Ports to Block
Defines a port range to block if the Enabled box is checked.
Port Start: Enter the starting port number to be blocked.
Port End: Enter ending port number to be blocked.
Protocol: Select the protocol type. Options are UDP, TCP,
or Both.
Apply
Saves all changes when clicked.
Page 70 / 108
Ubee Interactive
Ubee DDW366 Dual-Band Concurrent Advanced Wireless Gateway Subscriber User Guide
September 2014
66
8.4
Using the Local Log Option
The
Local Log
option displays Access Control event log reporting.
Steps
To view the access control local log:
1.
Click the
Access Control
link from the top of the screen.
2. Click
Local Log
from the left side of the screen. The
Local Log
fields are explained
following this screen example.
Label
Description
Last Occurrence
Displays the time when the last event occurred.
Action
Displays what is done by access control, including dropping or
permitting access requests.
Target
Displays the destination IP address of a certain access
request.
User
Displays the user who triggered this event log.
Source
Displays the source IP address of this event.
Clear Log
To empty the displayed log entries, click Clear Log.

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top