3
Contents
Getting Started
Meeting Web Browser Requirements ...................................................................................................... 5
Navigating the User Interface .................................................................................................................. 7
Setting up System Information
Setting up Your Password .................................................................................................................... 10
Configuring the Time Zone ................................................................................................................... 13
Overriding Automatic Date and Time Configuration ............................................................................... 15
Setting up Event Notifications ............................................................................................................... 16
Configuring Wireless Network
Setting up your Wireless Network ......................................................................................................... 18
Securing your Wireless Network ........................................................................................................... 20
Using the Encryption Key ............................................................................................................... 20
Allowing Devices with MAC Address Filtering ........................................................................................ 22
Allowing all Devices ........................................................................................................................ 22
Allowing Individual Devices ............................................................................................................ 24
Blocking Devices with MAC Address Filtering ....................................................................................... 25
Blocking all Devices ....................................................................................................................... 26
Blocking Individual Devices ............................................................................................................ 28
Customize Private Wireless Settings ..................................................................................................... 30
Configuring Wi-Fi Protected Setup ........................................................................................................ 31
Configuring Subscribed Services
Setting up Access Control ..................................................................................................................... 33
Configuring Content Screening ............................................................................................................. 36
Assigning a Computer to a Group ................................................................................................... 36
Setting Restrictions on Groups ....................................................................................................... 37
Specifying Content Categories ................................................................................................. 38
Specifying Web Sites ...................................................................................................................... 40
Configuring Web Remote Access ......................................................................................................... 42
Accessing Your Local Network Using Web Remote Access .................................................................. 44
Accessing Your Local Computer Files From a Remote Location ............................................................ 46
Ending Your Remote Access Session ................................................................................................... 48
Configuring Firewall
Hosting an Application .......................................................................................................................... 50
Removing Hosted Applications ............................................................................................................. 53
Defining a New Application Profile ........................................................................................................ 55
Adding Multiple Definitions to a Profile .................................................................................................. 58
Allowing all Applications (DMZplus) ...................................................................................................... 59
Stopping DMZplus ................................................................................................................................ 61