UTT Technologies Table of Contents
http://www.uttglobal.com
Page V
10.2
F
LEXIBLE
B
ANDWIDTH
M
ANAGEMENT
................................................................................ 173
10.3
P2P
R
ATE
L
IMIT
.................................................................................................................... 173
10.4
S
ESSION
L
IMITING
................................................................................................................ 175
CHAPTER 11
FIREWALL
....................................................................................................... 177
11.1
A
TTACK
P
REVENTION
........................................................................................................... 177
11.1.1
Internal Attack Prevention ........................................................................................... 177
11.1.2
External Attack Prevention .......................................................................................... 180
11.2
A
CCESS
C
ONTROL
................................................................................................................ 181
11.2.1
Introduction to Access Control .................................................................................... 181
11.2.2
Access Rule List .......................................................................................................... 183
11.2.3
Access Rule Settings ................................................................................................... 184
11.2.4
Configuration Examples for Access Rule .................................................................... 189
11.3
D
OMAIN
F
ILTERING
.............................................................................................................. 195
11.3.1
Domain Filtering Global Settings ................................................................................ 195
11.3.2
Domain Filtering Settings ............................................................................................ 195
11.4
10.4
MAC
A
DDRESS
F
ILTERING
........................................................................................... 196
11.4.1
MAC Address Filtering List ........................................................................................ 197
11.4.2
MAC Address Filtering Setting ................................................................................... 197
CHAPTER 12
VPN
................................................................................................................... 199
12.1
PPTP
VPN ............................................................................................................................ 199
12.1.1
Introduction to PPTP Implementation ......................................................................... 199
12.1.2
PPTP Client Settings ................................................................................................... 204
12.1.3
PPTP Server Settings ................................................................................................... 205
12.1.4
Notes on Configuring PPTP Client and Server............................................................ 208
12.1.5
PPTP List ..................................................................................................................... 208
12.1.6
How to Add, View, Edit and Delete PPTP Clients or Server Entries ........................... 210
12.1.7
Configuration Example for PPTP ................................................................................ 211
12.2
IPS
EC
VPN ........................................................................................................................... 212
12.2.1
Introduction to IPSec Implementation ......................................................................... 212
12.2.2
IPSec Settings–AutoKey (IKE) ................................................................................... 228
12.2.3
IPSec List .................................................................................................................... 238
12.2.4
How to Add, View, Edit and Delete IPSec Entries ...................................................... 239
12.2.5
Configuration Examples for IPSec – AutoKey (IKE) ................................................. 240
CHAPTER 13
SYSTEM
........................................................................................................... 248
13.1
A
DMINISTRATOR
................................................................................................................... 248
13.1.1
Administrator List ....................................................................................................... 248
13.1.2
Administrator Settings ................................................................................................. 249
13.2
S
YSTEM
T
IME
....................................................................................................................... 250
13.3
C
ONFIGURATION
................................................................................................................... 252
13.3.1
Backup Configuration ................................................................................................. 252
13.3.2
Restore Configuration ................................................................................................. 252