Gigabit Content Security Router User’s Manual
2.2 Setting Flow Chart
Below is the description for each setting process, and the correspondent contents and purposes.
#
Setting
Content
Purpose
1
Hardware installation
User’s demand.
Install Security router hardware based on user
physical requirements.
2
Login
Login the device with
Web Browser.
Login Security router web-based UI.
Verify device
specification
Verify Firmware version
and working status.
Verify Security router specification, Firmware
version and working status.
3
Set password and time
Set time and re-new
password.
Modify the login password considering safe
issue.
Synchronize the Security router time with WAN.
4
Set WAN connection
Verify WAN connection
setting, bandwidth
allocation, and protocol
binding.
Connect to WAN. Configure bandwidth to
optimize data transmission.
5
Set LAN connection:
physical port and IP
address settings
Set mirror port and
VLAN. Allocate and
manage LAN IP.
Provide mirror port, port management and VLAN
setting functions. Support Static/DHCP IP
allocation to meet different needs. IP group will
simplize the management work.
6
Set QoS bandwidth
management: avoid
bandwidth occupation
Restrict bandwidth and
session of WAN ports,
LAN IP and application.
To assure transmission of important information,
manage and allocate the bandwidth further to
achieve best efficiency.
7
Set Firewall: prevent
attack and improper
access to network
resources
Block attack, Set
Access rule and restrict
Web access.
Administrators can block BT to avoid bandwidth
occupation, and enable access rules to restrict
employee accessing internet improperly or using
MSN, QQ and Skype during working time. They
can also protect network from Worm or ARP
attacking.
8
Advanced
Settings:DMZ/Forwardin
g, UPnP, DDNS, MAC
Clone
DMZ/Forwarding,
UpnP, Routing Mode,
multiple WAN IP, DDNS
and MAC Clone
DMZ/Forwarding, UpnP, Routing Mode, multiple
WAN IP, DDNS and MAC Clone
9
Management and
maintenance settings:
Syslog, SNMP, and
configuration backup
Monitor Security router
working status and
configuration backup.
Administrators can look up system log and
monitor system status and inbound/outbound
flow in real time.
10 Logout
Close configuration
Logout Security router web-based UI.
- 7 -