
DG-WU2008 User Manual
4
4.5 AUTH INTERNET ACCESS .................................................................................................................................... 27
4.5.1 AUTH CONFIGURE..................................................................................................................................................................27
4.5.1.A PPPOEAUTHENTICATION................................................................................................................................................27
4.5.1.B PORTAL AUTHENTICATION...............................................................................................................................................29
4.5.1.C IP AUTHENTICATION .........................................................................................................................................................31
4.5.1.D MAC AUTHENTICATION ...................................................................................................................................................32
4.5.1.E RADIUS BILLING..................................................................................................................................................................32
4.5.1.F NOTIFY PAGE.......................................................................................................................................................................33
4.5.2 USER MANAGEMENT.............................................................................................................................................................33
4.5.2.A AUTH USER..........................................................................................................................................................................33
4.5.2.B AUTH USER STATUS...........................................................................................................................................................34
4.5.2.C DEPARTMENT/LEVEL DEFINITION ................................................................................................................................35
4.6 BEHAVIOR CONTROL............................................................................................................................................ 36
4.6.1 APPLICATION FIREWALL.......................................................................................................................................................36
4.6.2 URL REDIRECT ......................................................................................................................................................................37
4.6.3 DOMAIN REDIRECT................................................................................................................................................................37
4.6.4 MESSAGE PUSH CONFIGURE ................................................................................................................................................38
4.7 OBJECT MANAGEMENT ........................................................................................................................................ 39
4.7.1 BASIC OBJECT.........................................................................................................................................................................39
4.7.1.A TIME OBJECT.......................................................................................................................................................................39
4.7.1.B SOURCE IP OBJECT.............................................................................................................................................................39
4.7.1.C PORT OBJECT.......................................................................................................................................................................40
4.7.1.D DESTINATION IP OBJECT ..................................................................................................................................................40
4.7.2 APPLICATION OBJECT ...........................................................................................................................................................41
4.7.2.1 BUILT-IN APPLICATION OBJECT ......................................................................................................................................41
4.7.2.1.A BUILT-IN APP OBJECT UPGRADE .................................................................................................................................41
4.7.2.1.B BUILT-IN APP OBJECT....................................................................................................................................................41
4.7.2.2 CUSTOM APPLICATION OBJECT........................................................................................................................................42
4.7.2.2.A CUSTOMIZE APP OBJECT ...............................................................................................................................................42
4.7.2.2.B DEFINE APP BY DOMAIN ...............................................................................................................................................42
4.7.2.2.C DEFINE APP BY OBJECTIVE IP +PORT........................................................................................................................43
4.8 SAFETY PROTECTION........................................................................................................................................... 43
4.8.1 IP-MAC BINDING..................................................................................................................................................................43
4.8.2 CONNECTION QUANTITY LIMIT...........................................................................................................................................44
4.8.3 LAN ABNORMAL DETECTION..............................................................................................................................................44
4.8.4 LAN ATTACK PROTECTION .................................................................................................................................................45
4.8.5 WAN PING FORBID/WAN LOGIN ....................................................................................................................................45
4.9 LOG RECORD............................................................................................................................................................ 46
4.9.1 LOG PARAMETERS .................................................................................................................................................................46
4.9.2 USER AUTH LOG.....................................................................................................................................................................46
4.9.3 ONLINE USER LOG .................................................................................................................................................................47
4.9.4 INTERFACE FLOW LOG..........................................................................................................................................................47
4.9.5 SYSTEM LOG ...........................................................................................................................................................................48
4.10 VPN........................................................................................................................................................................... 48