DOCSIS 2.0 Advanced Cable Gateway CGD24N v2 User Manual
5-6
Customizing Your Network
v1.0, August 2009
The Trusted Devices table shows the PCs that are allowed access to the Internet through the
gateway. Click
Refresh
to update the Trusted Devices table.
2.
Select a device that will be added to the Add MAC Filter table through one of the following
methods:
•
If the PC that you want to block appears in the Trusted Devices table, click the radio
button for that PC to capture its MAC address in the Add MAC Filter table. If a MAC
address but no device name appears in the Add MAC Filter table, you can type a
descriptive name for the PC that you are adding to the table.
•
Manually enter the device name and MAC address of the PC you want to block to the Add
MAC Filter table.
3.
To add the device that you selected in
Add
. When you do
so, the
Enable
check box is automatically selected for that PC. Also note the following:
•
To deselect a PC from the MAC Filter List, select the PC from the drop-down list, and
then clear its
Enable
check box. Doing so leaves the PC in the MAC Filter List but
ensures that the PC is not blocked.
•
To remove a PC from the MAC Filter List, select the PC from the drop-down list, and then
click
Delete
.
4.
Select the days and times that a selected PC will be blocked:
a. Day(s) to Block
. Select the days on which the PC that is selected in the MAC Filter List
will be blocked. The default is Everyday.
b. Time of Day to Block
. Select a start time and an end time to specify a period during
which the PC that is selected in the MAC Filter List will be blocked. The default is All
Day. Be sure that you deselect the
All Day
check box if you want to enter specific times.
The selected period applies to each day that you selected in the previous step.
5.
Click
Add
to save your settings.
6.
Repeat
for all PCs that you want to block.
Configuring Port Blocking
A firewall has two default rules, one for inbound traffic (WAN to LAN) and one for outbound
traffic. Port blocking affects the outbound rules. These rules control access to outside resources
from local users.The default rule is to allow all access from the LAN side to the outside. You can
use port blocking to add predefined or custom rules to specify exceptions to the default rules.
Содержание CGD24N
Страница 10: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual x Contents v1 0 August 2009...
Страница 40: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual 3 6 Content Filtering v1 0 August 2009...
Страница 48: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual 4 8 Managing Your Network v1 0 August 2009...
Страница 68: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual 5 20 Customizing Your Network v1 0 August 2009...
Страница 74: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual 6 6 Troubleshooting v1 0 August 2009...
Страница 80: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual B 6 Related Documents v1 0 August 2009...
Страница 84: ...DOCSIS 2 0 Advanced Cable Gateway CGD24N v2 User Manual Index 4 v1 0 August 2009...