1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 5363
  8. /
  9. 22
Page 106 / 142 Scroll up to view Page 101 - 105
User Setup
The User Setup page is the master page to which each individual “user” is linked to a
specified time access rule, content filtering rule, and login password.
To access the
User Setup
page:
1
Click the
Router
menu tab.
2
Then click the
Parental Control
/
User Setup
submenu.
Figure 28 shows an example of the menu and Table 29 describes the items you can
select.
Note:
Always remember to click on the appropriate
Apply
,
Add
or
Remote
button to
store and activate the settings.
Figure 28. Example of User Setup Page
106
Page 107 / 142
Table 29. User Setup Menu Option
Option
Description
User
Configuration
Enter a user name (e.g. Mom, Dad, Bro, Sis) and click
Add User
.
Select a user from the drop-down list. Click the checkbox to enable
parental control for this user.
Users Settings
Enter the password for this user.
Password
Re-Enter
Password
Re-enter (confirm) the password for this user.
Select Enable to grant this user access to all Internet content
regardless of any policy or time settings.
Trusted User
Select the content policy for this. The content policy is defined in the
Parental Control - Basic page.
Content Rule
Click this checkbox to limit the user to visit only the sites specified in
the Allowed Domain List (see Parental Control - Basic page) of
his/her content policy.
White List Only
Select the access time rule for this user. The content policy is
defined in Parental Control - ToD Filter page.
Time Access
Rule
Enter the session duration time to limit this user’s Internet access
time.
Session
Duration
Configure the inactivity timeout for this user to re-login. If there is no
Internet activity for the specified amount of time (in minutes), the
user must login again to continue using the Internet.
Inactivity Time
When all above information has been entered, click the
Apply
button to activate these
settings. Repeat for each user.
107
Page 108 / 142
Trusted
Computers
Enter the MAC address of a computer or other device to bypass the
login requirement. This computer or device will always have access
as defined by the User profile above.
The Mac Addresses of the computers attached to your network can
be found in the
DHCP Clients
table.
To access the
DHCP Clients
table click on Router Menu tab, then
Basic/My Network submenu
.
When the above information has been entered, click the
Apply
button to activate these
settings. Repeat for each user.
108
Page 109 / 142
ToD Filter (Time of Day Filter)
The ToD page allows you to configure the Internet access policies according the time of
day settings. This page is tied to the
Parental Control - User Setup
page. You can
define up to 30 time access policies. You can define policies that block all public Internet
traffic for entire days or for specific time periods within each day. You can combine these
policies in any way you want.
To access the
ToD Filter
page:
1
Click the
Router
menu tab.
2
Then click the
Parental Control
/
ToD Filter
submenu.
Figure 29 shows an example of the menu and Table 30 describes the items you can
select.
Note:
Always remember to click on the appropriate
Apply
,
Add
or
Remote
button to
store and activate the settings.
Figure 29. Example of ToD Filter Page
109
Page 110 / 142
Table 30. ToD Filter Menu Option
Option
Description
Enter a name for the time access policy and click
Add New Policy
.
Time Access Policy
Configuration
Select a policy from the drop-down list. Click the
Enable checkbox to enable this rule.
Time Access Policy List
Days to Block
Click the checkboxes of the days that this rule
applies to.
Time to Block
Click the checkbox
All Day
to define this policy to
block Internet access for the entire day of each day
selected – or enter the start and stop times of the
periods you want to block access.
Note:
If you want to allow access for only a part of
the day, you may need to create and apply two
time policies. See example below.
Click enable if you want to block specific ports
Ports to Block
This is first port you want to block.
Port Start
This is the end of the range of ports you want to
block. If you only want to block one port enter the
port number in both the start and end fields.
Port End
Example of Time to Block –
create and apply two time policies to allow access
Mon – Fri 7:00pm – 9:00pm:
Time Policy Name
Days to Block
Time to Block
Weekday I
Mon – Fri
12:00am – 7:00pm
Weekday II
Mon – Fri
9:00pm – 12:00am
Select both Weekday I and Weekday II at User/Time Access Rule.
110

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top