ZyXEL ARMOR G1 User Guide - Page 57

Before You Begin, 8.2 Parental Control, 8.2.1 Device Screen, Device Screen

Page 57 highlights

Chapter 8 Applications protocol is supported on Microsoft Windows, Linux Samba and other operating systems (refer to your systems specifications for CIFS compatibility). Samba SMB is a client-server protocol used by Microsoft Windows systems for sharing files, printers, and so on. Samba is a free SMB server that runs on most Unix and Unix-like systems. It provides an implementation of an SMB client and server for use with non-Microsoft operating systems. File Transfer Protocol This is a method of transferring data from one computer to another over a network such as the Internet. VPN A virtual private network (VPN) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing. It is used to transport traffic over the Internet or any insecure network that uses TCP/IP for communication. 8.1.3 Before You Begin Make sure the NBG6818 is connected to your network and turned on. 1 Connect the USB device to one of the NBG6818's USB ports. 2 The NBG6818 detects the USB device and makes its contents available for browsing. If you are connecting a USB hard drive that comes with an external power supply, make sure it is connected to an appropriate power source that is on. Note: If your USB device cannot be detected by the NBG6818, see the troubleshooting for suggestions. 8.2 Parental Control Parental Control allows you to block specific URLs. You can also define time periods and days during which the NBG6818 performs parental control on a specific user. Note: This is not available if you are using bridge mode. 8.2.1 Device Screen Use this screen to enable parental control, view the parental control rules and schedules. Click Parental Control > Device to show the following screen. NBG6818 User's Guide 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

Chapter 8 Applications
NBG6818 User’s Guide
57
protocol is supported on Microsoft Windows, Linux Samba and other operating systems (refer to your
systems specifications for CIFS compatibility).
Samba
SMB is a client-server protocol used by Microsoft Windows systems for sharing files, printers, and so on.
Samba is a free SMB server that runs on most Unix and Unix-like systems. It provides an implementation of
an SMB client and server for use with non-Microsoft operating systems.
File Transfer Protocol
This is a method of transferring data from one computer to another over a network such as the Internet.
VPN
A virtual private network (VPN) provides secure communications between sites without the expense of
leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access
control and auditing. It is used to transport traffic over the Internet or any insecure network that uses
TCP/IP for communication.
8.1.3
Before You Begin
Make sure the NBG6818 is connected to your network and turned on.
1
Connect the USB device to one of the NBG6818’s USB ports.
2
The NBG6818 detects the USB device and makes its contents available for browsing. If you are
connecting a USB hard drive that comes with an external power supply, make sure it is connected to an
appropriate power source that is on.
Note: If your USB device cannot be detected by the NBG6818, see the troubleshooting for
suggestions.
8.2
Parental Control
Parental Control allows you to block specific URLs. You can also define time periods and days during
which the NBG6818 performs parental control on a specific user.
Note: This is not available if you are using bridge mode.
8.2.1
Device Screen
Use this screen to enable parental control, view the parental control rules and schedules.
Click
Parental Control
>
Device
to show the following screen.