UTT Technologies
Appendix E Figure Index
http://www.uttglobal.com
Page
16716716
Figure 7-2 Updating Policy .....................................................................................................98
Figure 7-3 Global Management Policy - Example..................................................................99
Figure 7-4 Group Management Policy List........................................................................... 100
Figure 7-5 Group Management Policy List (Continue) ........................................................ 100
Figure 7-6 Group Management Policy Settings ................................................................. 102
Figure 7-7 Group Management Policy Example - Policy 1 .................................................. 104
Figure 7-8 Group Management Policy Example - Policy 2 .................................................. 105
Figure 7-9 Group Management Policy Example - Policy 3 .................................................. 106
Figure 7-10 Group Management List – Example.................................................................. 106
Figure 7-11 Group Management List – Example (Continue) ............................................... 107
Figure 8-1 Access Rule List .................................................................................................. 110
Figure 8-2 Access Rule List (Continue) ................................................................................ 110
Figure 8-3 Access Rule List (Continue) ................................................................................ 111
Figure 8-4 Access Rule Settings - IP Filtering ...................................................................... 112
Figure 8-5 Access Rule Settings - URL Filtering.................................................................. 114
Figure 8-6 Access Rule Settings - Keyword Filtering........................................................... 115
Figure 8-7 Access Rule List - Example 1.............................................................................. 117
Figure 8-8 Access Rule List - Example 1 (Continue) ........................................................... 117
Figure 8-9 Access Rule List - Example 1 (Continue) ........................................................... 117
Figure 8-10 Access Rule List - Example 2............................................................................ 118
Figure 8-11 Access Rule List - Example 2 (Continue).......................................................... 118
Figure 8-12 Access Rule List - Example 2 (Continue) ......................................................... 119
Figure 8-13 Access Rule List - Example 3............................................................................ 119
Figure 8-14 Access Rule List - Example 3 (Continue) ......................................................... 120
Figure 8-15 Access Rule List - Example 3 (Continue) ......................................................... 120
Figure 8-16 Access Rule List - Example 4............................................................................ 121
Figure 8-17 Access Rule List - Example 4 (Continue) ......................................................... 121
Figure 8-18 Access Rule List - Example 4 (Continue) ......................................................... 121
Figure 8-19 Domain Filtering Global Settings...................................................................... 122
Figure 8-20 Domain Filtering Settings ................................................................................. 122
Figure 8-21 Attack Prevention Settings ................................................................................ 124
Figure 9-1 Typical Application of PPTP ............................................................................... 125
Figure 9-2 PPTP Packet Flow ............................................................................................... 127
Figure 9-3 PPTP Packet Format - Static IP/DHCP Internet Connection............................... 129
Figure 9-4 PPTP Packet Format - PPPoE Internet Connection............................................. 129
Figure 9-5 PPTP Client Settings ........................................................................................... 130
Figure 9-6 PPTP Client List .................................................................................................. 131
Figure 9-7 PPTP Client List (Continue)................................................................................ 131
Figure 9-8 Network Topology - The Gigabit Router Acts as a PPTP client.......................... 132
Figure 10-1 Administrator List.............................................................................................. 134
Figure 10-2 Administrator Settings ....................................................................................... 135
Figure 10-3 System Time Settings ........................................................................................ 136
Figure 10-4 Backup Configuration ....................................................................................... 138
Figure 10-5 Restore Configuration ....................................................................................... 138