![Value Point Gateway controller Series Скачать руководство пользователя страница 54](http://html1.mh-extra.com/html/value-point/gateway-controller-series/gateway-controller-series_user-manual_3289342054.webp)
G
ATEWAY
C
ONTROLLER
S
ERIES
U
SER
M
ANUAL
2011, VALUEPOINT NETWORKS, INC. ALL RIGHTS RESERVED
P
AGE
54
OF
124
Pass-through Source IP Type the Subscriber’s pass-through IP Address here.
Subscribers or devices with these addresses will be
permanently connected. These IP Addresses are not affected
by the black list, redirection, or any other connection limitation.
You can use this table for equipment like security cameras,
which must be permanently connected to the internet.
Pass-through MAC Address
Type the Subscriber’s pass-through MAC Addresses
here. Subscribers with these addresses will not be required to
authenticate, but must open a web browser to be connected to
the internet and are otherwise subject to security settings,
advertisements, etc.
Note: As with the No Authentication configuration, MAC Address Pass-through users will
need to initiate a HTTP Web Browser connection to be added to the firewall so they can
send email, ping, or make other connections through the Controller.
Blacklist MAC Address Type the MAC address of blocked Subscribers here.
Subscribers with these MAC addresses will not be able to
authenticate.
Pass-through Destination IP Address Type the pass-through Destination IP Addresses
here. All subscribers will be able to access these IP addresses
without having to authenticate.
Pass-through URL (walled Garden) Type the pass-through Destination URL here.
Subscribers will be able to access these web pages without
having to authenticate.
Note: Use the pass-through tables to allow access to web resources before the subscriber
is logged in. This includes redirect login pages and any images/advertisements on those
pages. If you want to redirect on logout add those pages here as well.