UTT Technologies Table of Contents
http://www.uttglobal.com
Page III
6.2.1
Disabling Wireless Security........................................................................................... 91
6.2.2
Wireless Security Settings – WEP ................................................................................. 91
6.2.3
Wireless Security Settings - WPA/WPA2 ...................................................................... 93
6.2.4
Wireless Security Settings - WPA-PSK/WPA2-PSK ..................................................... 94
6.3
W
IRELESS
MAC
A
DDRESS
F
ILTERING
.................................................................................... 96
6.3.1
MAC Address Filtering Global Settings ........................................................................ 96
6.3.2
MAC Address Filtering List .......................................................................................... 97
6.3.3
MAC Address Filtering Settings .................................................................................... 97
6.3.4
How to Configure MAC Address Filtering ................................................................... 98
6.3.5
Configuration Example for MAC Address Filtering ..................................................... 98
6.4
A
DVANCED
W
IRELESS
S
ETTINGS
.......................................................................................... 100
6.5
W
IRELESS
C
LIENT
L
IST
........................................................................................................ 102
CHAPTER 7
ADVANCED
..................................................................................................... 103
7.1
NAT
AND
DMZ .................................................................................................................... 103
7.1.1
Introduction to NAT Features ...................................................................................... 103
7.1.2
Port Forwarding ........................................................................................................... 105
7.1.3
NAT Rule ..................................................................................................................... 109
7.1.4
DMZ ............................................................................................................................ 115
7.2
S
TATIC
R
OUTE
...................................................................................................................... 116
7.2.1
Introduction to Static Route ......................................................................................... 116
7.2.2
Static Route List .......................................................................................................... 116
7.2.3
Static Route Settings.................................................................................................... 117
7.2.4
How to Add Static Routes ........................................................................................... 118
7.3
P
OLICY
R
OUTING
.................................................................................................................. 119
7.3.1
Policy Routing Settings ............................................................................................... 120
7.3.2
Enable Policy Routing ................................................................................................. 122
7.3.3
Policy Routing List ...................................................................................................... 122
7.4
A
NTI
-N
ET
S
NIPER
.................................................................................................................. 123
7.5
P
LUG AND
P
LAY
.................................................................................................................... 123
7.5.1
Introduction to Plug and Play ...................................................................................... 123
7.5.2
Enable Plug and Play ................................................................................................... 124
7.6
S
YSLOG
................................................................................................................................ 125
7.7
SNMP .................................................................................................................................. 125
CHAPTER 8
USER MANAGEMENT
................................................................................... 127
8.1
U
SER
S
TATUS
........................................................................................................................ 127
8.1.1
User Application Analysis Pie Charts .......................................................................... 127
8.1.2
User Status List ........................................................................................................... 128
8.2
IP/MAC
B
INDING
................................................................................................................. 129
8.2.1
Introduction to IP/MAC Binding ................................................................................. 130
8.2.2
IP/MAC Binding Global Settings ................................................................................ 131
8.2.3
IP/MAC Binding List .................................................................................................. 132