UTT Technologies Appendix E Figure Index
http://www.uttglobal.com
Page 284
Figure 9-2 Schedule Settings
.............................................................................................. 157
Figure 9-3 Internet Application Management List ............................................................. 158
Figure 9-4 Internet Application Management Settings ...................................................... 159
Figure 9-5 Internet Application Management List – Example ........................................... 162
Figure 9-6 Internet Application Management List – Example (continued)........................ 162
Figure 9-7 QQ Whitelist ..................................................................................................... 163
Figure 9-8 Import QQ Numbers ......................................................................................... 164
Figure 9-9 MSN Whitelist .................................................................................................. 165
Figure 9-10 Daily Routine Notification ............................................................................. 166
Figure 9-11 Account Expiration Notification .................................................................... 167
Figure 9-12 Internet Application Audit .............................................................................. 168
Figure 9-13 Log Management ............................................................................................ 169
Figure 9-14 Policy Database List ....................................................................................... 170
Figure 10-1 Fixed Rate Limiting Rule List ........................................................................ 171
Figure 10-2 Fixed Rate Limiting Rule Settings ................................................................. 172
Figure 10-3 Flexible Bandwidth Management Settings ..................................................... 173
Figure 10-4 P2P Rate Limit Settings ..................................................................................... 174
Figure 10-5 Session Limiting ............................................................................................. 175
Figure 11-1 Internal Attack Prevention Settings ................................................................... 178
Figure 11-2 External Attack Prevention Settings .................................................................. 178
Figure 11-3 Access Rule List ................................................................................................ 183
Figure 11-4 Access Rule List (Continue) .............................................................................. 183
Figure 11-5 Access Rule List (Continue) .............................................................................. 183
Figure 11-6 Access Rule Settings - IP Filtering .................................................................... 185
Figure 11-7 Access Rule Settings - URL Filtering ................................................................ 187
Figure 11-8 Access Rule Settings - Keyword Filtering ......................................................... 188
Figure 11-9 Access Rule List - Example 1 ............................................................................ 190
Figure 11-10 Access Rule List - Example 1 (Continue) ........................................................ 190
Figure 11-11 Access Rule List - Example 1 (Continue) ........................................................ 190
Figure 11-12 Access Rule List - Example 2 .......................................................................... 191
Figure 11-13 Access Rule List - Example 2 (Continue) ........................................................ 191
Figure 11-14 Access Rule List - Example 2 (Continue) ........................................................ 192
Figure 11-15 Access Rule List - Example 3 .......................................................................... 192
Figure 11-16 Access Rule List - Example 3 (Continue) ........................................................ 193
Figure 11-17 Access Rule List - Example 3 (Continue) ........................................................ 193
Figure 11-18 Access Rule List - Example 4 .......................................................................... 194
Figure 11-19 Access Rule List - Example 4 (Continue) ........................................................ 194
Figure 11-20 Access Rule List - Example 4 (Continue) ........................................................ 194
Figure 11-21 Domain Filtering Global Settings .................................................................... 195
Figure 11-22 Domain Filtering Settings ................................................................................ 195
Figure 12-1 Typical Application of PPTP ............................................................................. 199
Figure 12-2 PPTP Packet Flow ............................................................................................. 201
Figure 12-3 PPTP Packet Format - Static IP/DHCP Internet Connection ............................. 203
Figure 12-4 PPTP Packet Format - PPPoE Internet Connection ........................................... 203