Setting Flow Chart - Planet CS-5800 User Manual

Gigabit content security router
Table of Contents

Advertisement

2.2 Setting Flow Chart

Below is the description for each setting process, and the correspondent contents and purposes.
#
Setting
1
Hardware installation
2
Login
3
Verify device
specification
Set password and time
4
Set WAN connection
5
Set LAN connection:
physical port and IP
address settings
6
Set QoS bandwidth
management: avoid
bandwidth occupation
7
Set Firewall: prevent
attack and improper
access to network
resources
8
Advanced
Settings:DMZ/Forwardin
g, UPnP, DDNS, MAC
Clone
9
Management and
maintenance settings:
Syslog, SNMP, and
configuration backup
10
Logout
Content
User's demand.
Login the device with
Web Browser.
Verify Firmware version
and working status.
Set time and re-new
password.
Verify WAN connection
setting, bandwidth
allocation, and protocol
binding.
Set mirror port and
VLAN. Allocate and
manage LAN IP.
Restrict bandwidth and
session of WAN ports,
LAN IP and application.
Block attack, Set
Access rule and restrict
Web access.
DMZ/Forwarding,
UpnP, Routing Mode,
multiple WAN IP, DDNS
and MAC Clone
Monitor Security router
working status and
configuration backup.
Close configuration
- 7 -
Gigabit Content Security Router User's Manual
Purpose
Install Security router hardware based on user
physical requirements.
Login Security router web-based UI.
Verify Security router specification, Firmware
version and working status.
Modify the login password considering safe
issue.
Synchronize the Security router time with WAN.
Connect to WAN. Configure bandwidth to
optimize data transmission.
Provide mirror port, port management and VLAN
setting functions. Support Static/DHCP IP
allocation to meet different needs. IP group will
simplize the management work.
To assure transmission of important information,
manage and allocate the bandwidth further to
achieve best efficiency.
Administrators can block BT to avoid bandwidth
occupation, and enable access rules to restrict
employee accessing internet improperly or using
MSN, QQ and Skype during working time. They
can also protect network from Worm or ARP
attacking.
DMZ/Forwarding, UpnP, Routing Mode, multiple
WAN IP, DDNS and MAC Clone
Administrators can look up system log and
monitor system status and inbound/outbound
flow in real time.
Logout Security router web-based UI.

Advertisement

Table of Contents
loading

Table of Contents