5.1.3
On
‐
Demand
User
...............................................................................................................................
44
5.1.4
Free
Authentication
..........................................................................................................................
53
5.2
User
Login
...................................................................................................................................................
54
5.2.1
Default
Authentication
..........................................................................................................................
54
5.2.2
Login
with
Postfix
..................................................................................................................................
54
5.2.3
An
Example
of
User
Login
......................................................................................................................
54
6
Restrain
the
Users
.................................................................................................................................................
55
6.1
Black
List
......................................................................................................................................................
55
6.2
Group
...........................................................................................................................................................
56
6.3
Policy
.............................................................................................................................................................
56
6.3.1
Schedule
..............................................................................................................................................
58
6.3.2
Firewall
................................................................................................................................................
59
6.3.3
QoS
Profile
..........................................................................................................................................
62
6.3.4
Routing
..................................................................................................................................................
63
6.3.5
User
Privilege
.......................................................................................................................................
70
7
Access
Network
without
Authentication
...........................................................................................................
71
7.1
DMZ
..............................................................................................................................................................
71
7.2
Virtual
Server
.............................................................................................................................................
72
7.3
Privilege
List
................................................................................................................................................
73
7.3.1
Privilege
IP
.............................................................................................................................................
74
7.3.2
Privilege
MAC
.......................................................................................................................................
75
7.3.3
Privilege
IPv6
.........................................................................................................................................
75
7.4
Disable
Authentication
in
Public
Zone
..........................................................................................................
76
8
User
Login
and
Logout
...........................................................................................................................................
77
8.1
Before
Login
..................................................................................................................................................
77
8.1.1
Login
with
SSL
........................................................................................................................................
77
8.1.2
Internal
Domain
Name
with
Certificate
................................................................................................
78
8.1.3
Walled
Garden
.......................................................................................................................................
81
8.1.4
Walled
Garden
AD
.................................................................................................................................
82
8.2
After
Login
..................................................................................................................................................
83
8.2.1
Portal
URL
after
successful
login
..........................................................................................................
83
8.2.2
Idle
Timer
..............................................................................................................................................
84
8.2.3
Multiple
Login
............................................................................................................................................
85
9
Networking
Features
of
a
Gateway
.......................................................................................................................
86
9.1
IP
Plug
and
Play
...........................................................................................................................................
86
9.2
Dynamic
Domain
Name
Service
(DDNS)
........................................................................................................
87
9.3
Port
and
IP
Forwarding
.................................................................................................................................
88