Tenda W15E User Manual page 8

Ac1200 wireless hotspot router
Table of Contents

Advertisement

8.4.3 Verification ........................................................................................................................................ 88
9
VPN Service ........................................................................................................................................................ 89
9.1 PPTP/L2TP Client .......................................................................................................................................... 89
9.2 PPTP/L2TP Server ......................................................................................................................................... 91
9.3 IPSec ............................................................................................................................................................. 93
9.4 Example of PPTP/L2TP Configuration .......................................................................................................... 97
9.4.1 Networking requirement .................................................................................................................. 97
9.4.2 Solution ............................................................................................................................................. 97
9.4.3 Configuration procedure ................................................................................................................... 98
9.4.4 Verification ...................................................................................................................................... 101
9.5 Example of IPSec Configuration ................................................................................................................. 104
9.5.1 Networking requirement ................................................................................................................ 104
9.5.2 Solution ........................................................................................................................................... 104
9.5.3 Configuration procedure ................................................................................................................. 104
9.5.4 Verification ...................................................................................................................................... 107
10
Security .................................................................................................................................................... 108
10.1 IP-MAC Binding ........................................................................................................................................ 108
10.1.1 Overview ....................................................................................................................................... 108
10.1.2 Adding an IP-MAC Binding Rule .................................................................................................... 109
10.1.3 Example of IP-MAC Binding .......................................................................................................... 110
10.2 Firewall ..................................................................................................................................................... 113
11
Captive Portal ........................................................................................................................................... 115
11.1 Basic Settings ........................................................................................................................................... 115
11.1.1 Overview ....................................................................................................................................... 115
11.1.2 Enabling Captive Portal ................................................................................................................. 116
11.2 User Management ................................................................................................................................... 117
11.2.1 Overview ....................................................................................................................................... 117
11.2.2 Adding Authentication-free Host .................................................................................................. 118
11.2.3 Adding a Web Account.................................................................................................................. 119
11.3 Example of Web Authentication .............................................................................................................. 120
11.3.1 Networking requirement .............................................................................................................. 120
11.3.2 Solution ......................................................................................................................................... 120
11.3.3 Configuration procedure ............................................................................................................... 120

Advertisement

Table of Contents
loading

Table of Contents