6.3. User Login.......................................................................................................................94
6.3.1. An Example of User Login .......................................................................................................94
6.3.2. Default Authentication..............................................................................................................96
6.3.3. Login with Postfix.....................................................................................................................96
7. Policies and Access Control.............................................................................97
7.1. Policy ..............................................................................................................................97
7.1.1. Firewall.....................................................................................................................................99
7.1.2. Routing...................................................................................................................................104
7.1.3. Schedule ................................................................................................................................105
7.1.4. Session Limit..........................................................................................................................106
7.2. User Access Control......................................................................................................107
7.3. Session Limit & Session Log.........................................................................................111
8. Users’ Login and Logout.................................................................................113
8.1. Before User Login .........................................................................................................113
8.1.1. Login with SSL.......................................................................................................................113
8.1.2. Internal Domain Name with Certificate ..................................................................................114
8.1.3. Walled Garden .......................................................................................................................116
8.1.4. Walled Garden AD List...........................................................................................................117
8.1.5. Mail Message.........................................................................................................................119
8.2. After User Login ............................................................................................................120
8.2.1. Portal Home Page..................................................................................................................120
8.2.2. Idle Timer ...............................................................................................................................121
8.2.3. Multiple Login.........................................................................................................................122
8.2.4. Change Password Privilege...................................................................................................123
8.2.5. Proxy Server ..........................................................................................................................124
9. Local Area AP Management ............................................................................126
9.1. Multiple Type of AP........................................................................................................127
9.2. Configure AP Template..................................................................................................128
9.3. AP Discovery.................................................................................................................131
9.3.1. AP Background Discovery .....................................................................................................133
9.4. Manually add AP ...........................................................................................................134
9.5. AP with Service Zone....................................................................................................135
9.6. AP Security ...................................................................................................................137
9.7. Change managed AP settings .......................................................................................138
9.8. AP Operations from AP List...........................................................................................141
9.8.1. Reboot, Enable, Disable and Delete the AP..........................................................................141
9.8.2. Apply Template.......................................................................................................................142
9.8.3. Apply Service Zone (Tag-Based Only)...................................................................................143
9.9. Firmware management and upgrade.............................................................................144
9.10. WDS Management........................................................................................................145
9.11. Rogue AP Detection......................................................................................................146
9.12. AP Load Balancing........................................................................................................148
10. Wide Area AP Management.............................................................................151
10.1. AP Discovery.................................................................................................................152
10.2. Manually add AP ...........................................................................................................153
10.3. Manage AP Lists ...........................................................................................................154
10.4. Manage Third Party AP .................................................................................................156
10.5. Map...............................................................................................................................157
10.5.1. Register key from Google ......................................................................................................158
10.5.2. Create a Map .........................................................................................................................159
10.5.3. Marking APs on your Map......................................................................................................160
10.5.4. Operations from Map page ....................................................................................................163
10.6. AP Operations from AP List...........................................................................................164
10.7. WDS List.......................................................................................................................166
10.8. Backup Config...............................................................................................................167
10.9. Firmware management and upgrade.............................................................................168
10.10. CAPWAP.......................................................................................................................169
11. Networking Features of a Gateway.................................................................170
11.1. DMZ ..............................................................................................................................170
11.2. Virtual Server.................................................................................................................171