Elife Complete User Manual
Elife Complete User Manual
Elife Complete User Manual
COPYRIGHT NOTICE
Copyright© reserved by Etisalat
ALL RIGHTS RESERVED
The information contained herein is proprietary and confidential information for the use of
Etisalat personnel only. No part of this material should be reproduced, published in any
form by any means, electronic or mechanical including photocopy or any information
storage or retrieval system nor should the materials be disclosed to third parties unless
previously authorized in writing by Etisalat. Product names mentioned herein are for
identification purposes only and may be Trademarks and/or Registered Trademarks of their
respective companies.
Copyright© - Etisalat - All rights Reserved ii
Table of Contents
1 Introduction ..........................................................................................................................4
1.1 ... Scope and Purpose ...............................................................................................................4
1.2 ... eLife Home Portal overview ................................................................................................4
1.3 ... Eligibility..............................................................................................................................4
2 Navigation ............................................................................................................................4
2.1 ... eLife Home Portal login.......................................................................................................4
2.1.1 Customers that have been registered ............................................................................................................ 5
2.1.2 Customers without Etisalat online account ................................................................................................... 5
2.2 ... Dashboard............................................................................................................................5
3 Parental Control ...................................................................................................................7
3.1 ... Create a new policy .............................................................................................................7
3.1.1 Content Filtering......................................................................................................................................... 10
3.1.2 Internet Access Time .................................................................................................................................. 10
3.2 ... Policy Display ....................................................................................................................11
4 Network Security ...............................................................................................................12
4.1 ... Antivirus .............................................................................................................................13
4.1.1 Activating/Deactivating Antivirus .............................................................................................................. 14
4.2 ... Firewall ..............................................................................................................................15
5 Managing other settings .....................................................................................................16
5.1 ... Managing WiFi networks ...................................................................................................16
5.2 ... Managing Devices .............................................................................................................17
5.2.1 Modifying Devices ..................................................................................................................................... 19
5.2.2 Pinning/Unpinning Devices ........................................................................................................................ 20
The Self Service Portal is represented as a web-page, functionally divided into several
tabs/pages with different content and controls.
1.3 Eligibility
Any eLife customer with D-link 850/ 850 or Technicolor Extreme router.
2 Navigation
2.2 Dashboard
Subscribers can change time period for traffic usage representation on the chart, and to
manage devices.
3 Parental Control
From the dashboard, customer selects the Parental Control tab in order to create new
policies, view/change existing policies and delete policies.
7
Chapter Name
8
Chapter Name
9
Chapter Name
This feature allows users to set weekdays and hours when device will have access to the
internet.
10
Chapter Name
11
Chapter Name
4 Network Security
12
Chapter Name
4.1 Antivirus
Antivirus examines files being downloaded from the internet for threats such as a virus or
other malware. If antivirus finds a threat it blocks the file even before it reaches user’s home
network. It also blocks access to the web sites which are known to have links to malicious
software.
13
Chapter Name
14
Chapter Name
4.2 Firewall
Firewall Rule enables subscribers to allow access to internal resources from particular
external IP address(es).
To set up a firewall rule:
• Navigate to Network Security tab.
• Click Add Firewall Rule.
• Select existing Port Forwarding.
• Specify Remote IP Address, Prefix Length, and Remote Peer Port.
• Click Apply Rule.
15
Chapter Name
Subscribers can manage Wi-Fi networks on the Wi-Fi tab. The SSP provides functionality to
manage up to 4 Wi-Fi networks: 2 Main Wi-Fi networks for 2.4 GHz band and for 5 GHz
band, and 2 Guest Wi-Fi networks for 2.4 GHz band and for 5 GHz band. For each of the Wi-
Fi networks, the following parameters can be set:
Enable or disable the Network.
Set up SSID (Wi-Fi name).
Set up WPA2-PSK key for the Network.
Note: Guest Wi-Fi can be enabled only if main Wi-Fi is activated for the same band.
Entered parameters are validated by the following rules:
SSID must contain only letters (A-z), numbers (0-9), dashes (-),
underscores (_), apostrophes ('), periods (.), spaces ( ), and commas
(,).
SSID must be a minimum of 1 character and a maximum of 32
characters.
WPA2-PSK key must be a minimum of 8 characters and a maximum
of 63 characters.
WPA2-PSK key must contain only letters (A-z) and numbers (0-9).
Figure 1 Wi-Fi management view
16
Chapter Name
17
Chapter Name
The Devices tab displays subscriber's devices with the following details:
• Device name
• IP address
• MAC address
• Vendor
• Is device associated with policy
• Is device online
• Is device pinned
• MAC address
18
Chapter Name
To modify a device:
• Open the Devices tab.
• Click Modify next to the necessary device.
• Update the parameters of the device.
• Click Apply Changes.
19
Chapter Name
By default, the SSP provides managing devices only in the Online status. To allow changes to
offline devices, the user should pin it.
To pin a device:
• Open the Devices tab.
• Click Pin near the device in Offline status.
• After that, a subscriber can rename the device, change device IP, and assign a police
to the device.
20
Chapter Name
The Total Usage page displays traffic consumption statistics by device for a selected period.
Both download and upload statistics are displayed in Megabytes.
By default, 24h time period is selected. Subscribers are able to chose one of following time
periods for statistics:
Last 24 hours
Last week
Last month
The devices table sorts by amount of consumed traffic and begins from the device with
biggest consumption.
The Total Usage page also displays a graphical representation of statistics using a bar
chart:
Figure 2 Total usage view
21
Chapter Name
The App Usage page displays a report of traffic consumption per application for selected
devices. Devices can be selected by enabling Track App Usage on the Device List page or
Modify Device page.
The top 10 applications with the highest traffic consumption are displayed. All traffic from
applications that were not covered in the top 10 are displayed as "OTHERS." If traffic was
not recognized (for example, encrypted traffic), it will be marked as "UNKNOWN."
By default, the 24h time period is selected. Subscribers are able to chose one of following
time periods for statistics:
Last 24 hours
Last week
Last month
By default, the App Usage page displays reports for all selected devices. Subscribers are
able to choose a particular device from the drop-down list.
The App Usage page also displays a graphical representation of the report using a pie chart:
Figure 3 Application usage view
22
Chapter Name
23
Chapter Name
To set up IPv6 firewall rules, the subscriber should perform the following steps:
1. Navigate to the Network Security page.
2. Select Ip v6.
3. Click Add Firewall Rule.
4. Select one of the available values from the Port Forwarding drop-
down menu
5. Specify Filter Name, Internal IP and Internal Port, Protocol,
Remote IP Address, Prefix Length if you need to grant access to a
pool of IP addresses, and Remote Peer Port if you want to specify
the very port of the external device. Note that the "0" value provides
access for all ports of the device within the specified pool of IP
addresses.
6. Click Apply Rule.
Figure 5 Firewall rules
24
Chapter Name
To activate Bandwidth on Demand, the subscriber should perform the following steps:
1. Open the Bandwidth on Demand page on the Service tab.
2. Choose one of proposed Rate Plans and click Activate for 1 day.
Note: Proposed Rate Plan List depends on the current subscriber's tariff and eligibility
check.
Figure 6 Bandwidth on demand view
To configure Quality of Service, the subscriber should perform the following steps:
1. Open the Services → QoS page.
2. Activate QoS using the toggle.
3. Select devices to include in the service.
4. Choose Application Group and Priority for the Group.
5. Create up to 20 rules by clicking the "Add New" button.
6. Click Apply settings.
The priority with which the application's traffic will be treated on network can be set from
the Priority drop-down menu. The following priorities are available:
Very High priority
High priority
Medium priority
25
Chapter Name
Low priority
Very High grants priority over all other traffic, Low grants lowest priority over all other
traffic.
Note: At least one device should be selected for activation the service.
Figure 7 Quality of Service configuration view
26
Chapter Name
6 Advanced Settings
The Settings tab gives access to settings for:
Information (opens by default)
DHCP v4
DHCP v6
Port Forwarding
Dynamic DNS
Figure 8 Dynamic DNS configuration view
The Information section is read-only. Users can quickly review the summary of home
network settings.
Figure 9 Information view
27
Chapter Name
6.2 DHCP v4
28
Chapter Name
6.3 DHCP v6
29
Chapter Name
Port forwarding settings disclose the external IP of the router to external requests from the
Web. If a user wants to view their home security camera remotely, or if a home LAN has a
server with data to be shared, e.g. music or gaming server, the Port Forwarding section
enables:
Switching UPnP "ON" or "OFF"
Specifying DMZ Host
Operating Port Forwarding rules
UPnP (Universal Plug & Play) is a set of network protocols for automatic configuration
services enabling data sharing within the network.
DMZ Host directs all external requests to the LAN device, whose IP address the user
specifies. Consider using proper safety software and settings on that device if you have any
private data on it.
Port Forwarding makes particular internal IP available from an external network:
Global Port – External communication port. Can be empty. The
possible values are between 1-65355. External requests must know
and have this port specified if a user sets it.
Private IP – IP address from your LAN subnet 192.168.2.0/24. The
address of LAN device disclosed for external requests.
30
Chapter Name
Dynamic DNS allows you to update your current dynamic IP address with DNS services.
This way, you can access your device (such as your webcam or internal server) using a
31
Chapter Name
domain name (for instance yourname.noip.me, where yourname is a name of your choice)
that will never change, instead of using an IP address that changes each time you reconnect.
At the moment, 2 service providers are supported:
Dynect.net
Noip.com
To connect to Dynamic DNS service providers, the subscriber should perform the following
steps:
1. Before using the Dynamic DNS service, visit the Dynamic DNS service
provider's website, and register a user account and a domain name.
2. In the Self-Service portal, navigate to the Dynamic DNS page (Settings
→ Dynamic DNS).
3. Choose Dynamic DNS Service Provider.
4. Enter Customer Name (DYNECT case only), User Name, and
Password.
5. Click the Connect button.
6. When the connection establishes, the status will change to "Active,"
and the Customer Name field will be only in Read Only mode.
Figure 12 Dynamic DNS configuration view
To create a Dynamic DNS record, the subscriber should perform the following steps:
1. Connect to Dynamic DNS Service Provider.
32
Chapter Name
Record to be deleted:
Figure 14 Notification example
To update a password for connection to Dynamic DNS provider, the subscriber should
perform the following steps:
1. Before using the Dynamic DNS service, visit the Dynamic DNS service
provider's website, and register a user account and a domain name.
2. On the Dynamic DNS page in the Self-Service Portal, click the Update
button. The button will be avaliable instead of "Connect."
3. Enter the old account password and the new password in their
respective fields.
4. Click Update Password button
Note: Password updating on all systems can take up to 15-20 minutes, so the subscriber
may see credential errors during this time.
33