Page 226 / 367 Scroll up to view Page 221 - 225
Chapter 17 Parental Control
VMG4380-B10A / VMG4325-B10A User’s Guide
226
Page 227 / 367
VMG4380-B10A / VMG4325-B10A User’s Guide
227
C
HAPTER
18
Scheduler Rules
18.1
Overview
You can define time periods and days during which the Device performs scheduled rules of certain
features (such as Firewall Access Control, Parental Control) on a specific user
in the
Scheduler Rules
screen.
18.2
The Scheduler Rules Screen
Use this screen to view, add, or edit time schedule rules.
Click
Security > Scheduler Rules
to open the following screen.
Figure 112
Security > Scheduler Rules
The following table describes the fields in this screen.
Table 84
Security > Scheduler Rules
LABEL
DESCRIPTION
Add new rule
Click this to create a new rule.
#
This is the index number of the entry.
Rule Name
This shows the name of the rule.
Day
This shows the day(s) on which this rule is enabled.
Time
This shows the period of time on which this rule is enabled.
Description
This shows the description of this rule.
Modify
Click the
Edit
icon to edit the schedule.
Click the
Delete
icon to delete a scheduler rule.
Note: You cannot delete a scheduler rule once it is applied to a certain feature.
Page 228 / 367
Chapter 18 Scheduler Rules
VMG4380-B10A / VMG4325-B10A User’s Guide
228
18.2.1
Add/Edit a Schedule
Click the
Add
button in the
Scheduler Rules
screen or click the
Edit
icon next to a schedule rule
to open the following screen. Use this screen to configure a restricted access schedule for a specific
user on your network.
Figure 113
Scheduler Rules: Add/Edit
The following table describes the fields in this screen.
Table 85
Scheduler Rules: Add/Edit
LABEL
DESCRIPTION
Rule Name
Enter a name (up to 31 printable English keyboard characters, not including spaces) for this
schedule.
Day
Select check boxes for the days that you want the Device to perform this scheduler rule.
Time if Day
Range
Enter the time period of each day, in 24-hour format, during which parental control will be
enforced.
Description
Enter a description for this scheduler rule.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to exit this screen without saving.
Page 229 / 367
VMG4380-B10A / VMG4325-B10A User’s Guide
229
C
HAPTER
19
Certificates
19.1
Overview
The Device can use certificates (also called digital IDs) to authenticate users. Certificates are based
on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
Certificates provide a way to exchange public keys for use in authentication.
19.1.1
What You Can Do in this Chapter
The
Local Certificates
screen lets you generate certification requests and import the Device's
CA-signed certificates (
Section 19.4 on page 233
).
The
Trusted CA
screen lets you save the certificates of trusted CAs to the Device (
Section 19.4
on page 233
).
19.2
What You Need to Know
The following terms and concepts may help as you read through this chapter.
Certification Authority
A Certification Authority (CA) issues certificates and guarantees the identity of each certificate
owner. There are commercial certification authorities like CyberTrust or VeriSign and government
certification authorities. The certification authority uses its private key to sign certificates. Anyone
can then use the certification authority's public key to verify the certificates. You can use the Device
to generate certification requests that contain identifying information and public keys and then send
the certification requests to a certification authority.
Page 230 / 367
Chapter 19 Certificates
VMG4380-B10A / VMG4325-B10A User’s Guide
230
19.3
The Local Certificates Screen
Click
Security >
Certificates
to open the
Local Certificates
screen. This is the Device’s summary
list of certificates and certification requests.
Figure 114
Security > Certificates > Local Certificates
The following table describes the labels in this screen.
Table 86
Security > Certificates > Local Certificates
LABEL
DESCRIPTION
Private Key is
protected by a
password?
Select the checkbox and enter the private key into the text box to store it on the Device.
The private key should not exceed 63 ASCII characters (not including spaces).
Browse...
Click this to find the certificate file you want to upload.
Import Certificate
Click this button to save the certificate that you have enrolled from a certification
authority from your computer to the Device.
Create Certificate
Request
Click this button to go to the screen where you can have the Device generate a
certification request.
Current File
This field displays the name used to identify this certificate. It is recommended that you
give each certificate a unique name.
Subject
This field displays identifying information about the certificate’s owner, such as CN
(Common Name), OU (Organizational Unit or department), O (Organization or company)
and C (Country). It is recommended that each certificate have unique subject
information.
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as a common name, organizational unit or department, organization or
company and country.
Valid From
This field displays the date that the certificate becomes applicable. The text displays in
red and includes a
Not Yet Valid!
message if the certificate has not yet become
applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an
Expiring!
or
Expired!
message if the certificate is about to expire or has
already expired.
Modify
Click the
View
icon to open a screen with an in-depth list of information about the
certificate (or certification request).
For a certification request, click
Load Signed
to import the signed certificate.
Click the
Remove
icon to delete the certificate (or certification request). You cannot
delete a certificate that one or more features is configured to use.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top