UTT Technologies
Table of Contents
http://www.uttglobal.com
Page 3
/
www.argo-contar.com
6.2.5 How to Add IP/MAC Bindings ........................................................................... 83
6.2.6 Internet W hitelist and Blacklist .......................................................................... 84
6.3 Static Route .............................................................................................................. 87
6.3.1 Introduction to Static Route .............................................................................. 87
6.3.2 Static Route List................................................................................................ 87
6.3.3 Static Route Settings ........................................................................................ 88
6.3.4 How to Add Static Routes ................................................................................. 89
6.4 PPPoE Server .......................................................................................................... 91
6.4.1 PPPoE Overview .............................................................................................. 91
6.4.2 PPPoE Server Global Settings ......................................................................... 93
6.4.3 PPPoE Account List .......................................................................................... 94
6.4.4 PPPoE Account Settings .................................................................................. 94
6.4.5 PPPoE User Status .......................................................................................... 95
Chapter 7 User Management ....................................................................................... 97
7.1 Global Management ................................................................................................. 97
7.1.1 Global Management Policy Settings ................................................................. 97
7.1.2 An Example for Global Management Policy ..................................................... 99
7.2 Group Management ............................................................................................... 100
7.2.1 Group Management Policy List....................................................................... 100
7.2.2 Group Management Policy Settings ............................................................... 101
7.2.3 Execution Order of Group Management Policies ........................................... 103
7.2.4 Priorities of Global and Group Management Policies and Access Rules ....... 103
7.2.5 An Example for Group Management Policy ................................................... 103
Chapter 8 Firewall ....................................................................................................... 108
8.1 Access Control ....................................................................................................... 108
8.1.1 Introduction to Access Control ........................................................................ 108
8.1.2 Access Rule List ..............................................................................................110
8.1.3 Access Rule Settings ....................................................................................... 111
8.1.4 Configuration Examples for Access Rule ........................................................116
8.2 Domain Filtering ..................................................................................................... 122
8.2.1 Domain Filtering Global Settings .................................................................... 122
8.2.2 Domain Filtering Settings................................................................................ 122
8.3 Attack Prevention ................................................................................................... 124
Chapter 9 VPN ............................................................................................................. 125
9.1 Introduction to PPTP Implementation..................................................................... 125
9.1.1 Protocol Overview........................................................................................... 126
9.1.2 Packet Flow - PPTP Client ............................................................................. 127
9.1.3 User Authentication......................................................................................... 128
9.1.4 Data Confidentiality......................................................................................... 128
9.1.5 MTU and Fragmentation ................................................................................. 128
9.1.6 PPTP Sessions Limit ...................................................................................... 130