UTT Technologies Chapter 8 User
Management
http://www.uttglobal.com
Page 135
Step 3
After you have added some IP/MAC bindings, you can view them in the
IP/MAC
Binding List
.
Step 4
If you want to block the undefined local computers from accessing the Router
and Internet, please clear the
Allow Undefined LAN PCs
check box; else, the
undefined local computers are allowed to access the Router and Internet.
Step 5
If you want to temporarily block a user matching an IP/MAC binding from
accessing the Router and Internet, please clear the binding
’s
Allow
check box.
After you have finished configuring IP/MAC binding feature, when receiving a packet
initiated from LAN, the Router will firstly compare the packet with the bindings in the
IP/MAC Binding List
, and then process the packet according to the related configuration.
The packet will be allowed to pass or be dropped immediately. If it is allowed to pass, the
packet will be further processed by other function modules.
8.2.6 Internet Whitelist and Blacklist
8.2.6.1 Introduction to Internet Whitelist and Blacklist Based
on IP/MAC Binding
By utilizing IP/MAC binding feature, you can flexibly configure an Internet whitelist or
blacklist for the LAN users.
If you want to allow only a small number of LAN users to access the Internet, you can
configure an Internet whitelist for these users. Then all users cannot access the Internet,
except those listed in the whitelist.
If you want to block only a small number of LAN users from accessing the Internet, you
can configure an Internet blacklist for these users. Then all users can access the Internet,
except those listed in the blacklist.
On the Router, a user listed in the whitelist is a legal user, i.e., the user
’s IP and MAC
address pair matches an IP/MAC binding whose
Allow
check box is checked. A user
listed in the blacklist is an illegal user, i.e., the user
’s IP and MAC address pair matches an
IP/MAC binding whose
Allow
check box is cleared; or the IP address or MAC address is
the same as that of an IP/MAC binding, but not both.
8.2.6.2 How to Configure an Internet Whitelist
To configure an Internet whitelist, follow these steps: