Grandstream Networks GWN7000 User Manual page 11

Enterprise multi-wan gigabit vpn router
Hide thumbs Also See for GWN7000:
Table of Contents

Advertisement

Figure 40: Client Bandwidth Rules .............................................................................................................. 70
Figure 41: Block a Client ............................................................................................................................. 70
Figure 42: Unban Client .............................................................................................................................. 71
Figure 43: Global Blacklist .......................................................................................................................... 71
Figure 44: Managing the Global Blacklist ................................................................................................... 71
Figure 45: Adding a MAC Access List ......................................................................................................... 72
Figure 46: Blacklist Access List ................................................................................................................... 72
Figure 47: Ban/Unban Client ....................................................................................................................... 73
Figure 48: Create CA Certificate ................................................................................................................. 75
Figure 49: CA Certificate ............................................................................................................................. 77
Figure 50: Generate Server Certificates ..................................................................................................... 78
Figure 51: User Management ..................................................................................................................... 80
Figure 52: Client Certificate......................................................................................................................... 82
Figure 53: Create OpenVPN® Server ......................................................................................................... 85
Figure 54: OpenVPN® ................................................................................................................................ 88
Figure 55: OpenVPN® Client ...................................................................................................................... 89
Figure 56: OpenVPN® Client ...................................................................................................................... 92
Figure 57: L2TP Client Configuration .......................................................................................................... 93
Figure 58: L2TP Client ................................................................................................................................ 95
Figure 59: PPTP Client Configuration ......................................................................................................... 96
Figure 60: PPTP Client ............................................................................................................................... 97
Figure 61: PPTP Server Configuration ....................................................................................................... 98
Figure 62: Branch Office IPSec Phase 1 Configuration ............................................................................ 103
Figure 63:Branch Router IPSec Phase 2 Configuration ........................................................................... 105
Figure 64: HQ Router IPSec Phase 2 Configuration ................................................................................ 106
Figure 65: Basic → General Settings ........................................................................................................ 108
Figure 66: Port Forward ............................................................................................................................ 109
Figure 67: DMZ ......................................................................................................................................... 110
Figure 68: INPUT Rule Sample................................................................................................................. 112
Figure 69: Output Rules Sample ............................................................................................................... 114
Figure 70: Traffic Rules Settings ............................................................................................................... 115
Figure 71: Captive Portal Policy ................................................................................................................ 119
Figure 72: Add a New Policy ..................................................................................................................... 120
Figure 73: Authentication rules ................................................................................................................. 122
Figure 74: Captive Portal Files .................................................................................................................. 123
Figure 75: Captive Portal Clients .............................................................................................................. 124
Figure 76: Add Voucher Sample ............................................................................................................... 126
Figure 77: Vouchers List ........................................................................................................................... 126
Figure 78: Captive Portal with Voucher authentication ............................................................................. 128
Figure 79: MAC Address Bandwidth Rule ................................................................................................. 130
Figure 80: Bandwidth Rules ...................................................................................................................... 130
Figure 81: Create Blackhole Policy ........................................................................................................... 131
P a g e
|
11
GWN7000 User Manual
Version 1.0.6.28

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents