This answer applies to the Zoom Cable Modem/Router Models 5350 and 5352.
- Paste or type the URL http://192.168.0.1 into your web browser’s Address field, and press Enter.
- Log into your Zoom 5350 Cable Modem/Router’s web console:
username = admin
password = admin(If you have changed the username and password from their defaults, enter the new login information.)
Figure 1
Create a Parental Control Policy
See the example picture below (Figure 2) for reference in carrying out steps 3 – 9:
- Once logged in, click Parental Control on the top toolbar. You will see the Parental Control Basic Setup page.
- Check the box labeled Enable Parental Control, and click Apply.
- Under Content Policy Configuration, type a name for a policy that you will create, and click Add New Policy.
In the example, we named our policy "BlockSites." - Under Content Policy List, select the policy you just added.
In the example, this is "BlockSites." - Now add the keywords and domains that you would like to block. Choose a keyword that corresponds to the site. For domain, use the top-level web address of the site you want to block. This is an address like “www.google.com” or “www.yahoo.com.” Click Add keyword to add a keyword, and Add Domain to add a domain.
In the example, we block Facebook. We entered facebook as the keyword and www.facebook.com as the Blocked Domain. - If you want, you can create an override password for the policy. This will allow a user who knows this password to gain access to a site blocked by this policy for the duration of the current session.
- Click Apply.
Figure 2
Create a User Whose Internet Access is Limited by the Policy You Just Created
See the example picture below (Figure 3) for reference in carrying out steps 10 – 14:
- Under Configuration, type the name of the user you would like to create, and click Add User.
In the example, we create the user, "User.” - Under User Settings, select the user you just created, and check the Enable box.
In the example, we select "User," and click the “Enable” box. - Enter a password for the new user. You will need to type this twice.
- For Content Rule, select the content policy you created on step 5 of Create a Parental Control Policy. You select this from the drop down menu.
- Finally, click Apply.
Figure 3
Create a User Whose Internet Access Is Exempt from the Policy You Just Created (Optional)
See the example picture below (Figure 4) for reference in carrying out steps 15 – 21:
- Remain on the Parental Control User Setup page.
- In the left-hand pane, click the User Setup button. You will see the Parental Control User Setuppage.
- Under User Configuration, type the name of the user you would like to create, and click Add User.
In the example, we used “Admin” as the user name. - Under User Settings select the user you just created, and check the Enable box.
- Enter a password for the new user. You will need to type this twice.
- Check the Enable box for Trusted User, and click Apply. Note that Trusted Users must still enter a username and password in order to access the Internet.
Trusted Computers: On this page you can also add MAC addresses of any computers, tablets or other connected devices, Trusted Computers, that you do not want to be affected by parental control rules. Any users who access the Internet from these devices will be exempt from any parental control rules. These users also do not have to enter a username and password. See your devices’ documentation for information on where to find their MAC Addresses. Then type each MAC Address into the Trusted Computers field. Click Add after each entry is complete.)
- Finally, click Apply.
Figure 4
Create a Time of Day Access Policy
You can also set times that your parental control policy or policies are in effect. You do this by setting up one or more Time of Day Access Policies, or ToD Access Policies.
See the example picture below (Figure 5) for reference in carrying out step 22:
- In the left-hand pane, click the ToD Filter button. You will see the Parental Control Time of Day Access Policy page.
Figure 5
See the example picture below (Figure 6) for reference in carrying out steps 23 – 25:
- Enter a descriptive name for the policy you will create, and click Add New Policy.
- Under Time Access Policy List, select the policy name you just created, and check the Enabled checkbox.
- Enter the days and times when this TOD Access Policy will be in effect, and click Apply.
Figure 6
See the example pictures above for the User Setup page for reference in carrying out steps 26 – 28:
- Now click the User Setup button in the left-hand pane to go back to the Parental Control User Setup page.
- In the selection box under User Settings, select a User to whom you want a ToD Access Policy to apply.
- Go to the Time Access Rule line and select the TOD Access Policy to be assigned to this User. When finished click Apply.
In the example, the ToD Access Policy is “zoomtest.”
Verify Policies
Now that everything is set up according to your needs, test your Parental Control Policy, and if applicable your Time of Day Access Policy, to make sure they work.
Open a browser and point to a website. You should see the screen shown below.
You need to sign in as one of the users that you just created. (You will not need to sign in if your device’s MAC Address was entered as a Trusted Computer. See note Trusted Computers in step 20, above.)
- If you use a trusted user account the parental control policy should not be in effect.
- If you use a limited account, then the parental control policy should be active.
- You should be denied access to sites that are restricted by the Parental Control Policy.
- You should be denied access to the entire Internet if you have logged on during a time that is restricted by a Time of Day Access Policy.
Distribute Passwords
Give the username and password of the limited account to the people whose Internet access you want to restrict according to the parental control policies you have created.
Give the username and password of the trusted account to people whose Internet access you want to be unaffected by the Parental Control Policies.
- In the example, the limited account is named "User"
- In the example, the trusted account is named "Admin"
Note: In the example, if you sign in with the limited user and you try to go to www.facebook.com, you will see a warning that says that the site is blocked. The warning will ask for the override password for the policy you created. A person who knows the override password can enter it at that time to gain access to the blocked site. (NB: If someone enters the override password for a particular policy, this will override that policy for all current users, not just for the person who enters the override password. The override will last for the duration of the current session, or until the session timeout occurs (see below under Final Notes).)
Final Notes
By default each user login times out after 30 minutes. This also applies to override passwords. When the login or override times out, the cable modem/router will prompt the user to log in again. You can change the timeout for the login under Access Duration on the User Setup page.
Congratulations! You just finished setting up your parental control.
Comments
0 comments
Please sign in to leave a comment.