UTT HiPER 840G Advanced Configuration Manual page 5

Table of Contents

Advertisement

UTT Technologies
6.2.5
How to Add IP/MAC Bindings ........................................................................... 83
6.2.6
Internet W hitelist and Blacklist .......................................................................... 84
6.3
Static Route .............................................................................................................. 87
6.3.1
Introduction to Static Route .............................................................................. 87
6.3.2
Static Route List................................................................................................ 87
6.3.3
Static Route Settings ........................................................................................ 88
6.3.4
How to Add Static Routes ................................................................................. 89
6.4
PPPoE Server .......................................................................................................... 91
6.4.1
PPPoE Overview .............................................................................................. 91
6.4.2
PPPoE Server Global Settings ......................................................................... 93
6.4.3
PPPoE Account List .......................................................................................... 94
6.4.4
PPPoE Account Settings .................................................................................. 94
6.4.5
PPPoE User Status .......................................................................................... 95
User Management ....................................................................................... 97
7.1
Global Management ................................................................................................. 97
7.1.1
Global Management Policy Settings ................................................................. 97
7.1.2
An Example for Global Management Policy ..................................................... 99
7.2
Group Management ............................................................................................... 100
7.2.1
Group Management Policy List....................................................................... 100
7.2.2
Group Management Policy Settings ............................................................... 101
7.2.3
Execution Order of Group Management Policies ........................................... 103
7.2.4
Priorities of Global and Group Management Policies and Access Rules ....... 103
7.2.5
An Example for Group Management Policy ................................................... 103
Firewall ....................................................................................................... 108
8.1
Access Control ....................................................................................................... 108
8.1.1
Introduction to Access Control ........................................................................ 108
8.1.2
Access Rule List ..............................................................................................110
8.1.3
Access Rule Settings ....................................................................................... 111
8.1.4
Configuration Examples for Access Rule ........................................................116
8.2
Domain Filtering ..................................................................................................... 122
8.2.1
Domain Filtering Global Settings .................................................................... 122
8.2.2
Domain Filtering Settings................................................................................ 122
8.3
Attack Prevention ................................................................................................... 124
VPN ............................................................................................................. 125
9.1
Introduction to PPTP Implementation..................................................................... 125
9.1.1
Protocol Overview........................................................................................... 126
9.1.2
Packet Flow - PPTP Client ............................................................................. 127
9.1.3
User Authentication......................................................................................... 128
9.1.4
Data Confidentiality......................................................................................... 128
9.1.5
MTU and Fragmentation ................................................................................. 128
9.1.6
PPTP Sessions Limit ...................................................................................... 130
http://www.uttglobal.com
/
www.argo-contar.com
Table of Contents
Page 3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents