Ultrative WOC User manual

1
WOC
Wireless Office Communication System
User Manual
Applicable to Version 2.2.5.79.38

2
Contents
Chapter I Overview ........................................................................................................ 5
Overview.......................................................................................................................................................................................6
Product Appearance............................................................................................................................................6
Device Buttons....................................................................................................................................................7
Login Interface....................................................................................................................................................7
Service Menu......................................................................................................................................................7
Interface Buttons.................................................................................................................................................8
Function Description...........................................................................................................................................8
Chapter II Network ....................................................................................................... 10
Network Settings.................................................................................................................................................................... 11
WAN.................................................................................................................................................................11
Dual WAN with 3G Failover.............................................................................................................................11
MAC Cloning ...................................................................................................................................................12
LAN..................................................................................................................................................................12
DHCP Server ....................................................................................................................................................13
MAC Address Binding......................................................................................................................................13
DHCP Clients....................................................................................................................................................13
Wireless Network ................................................................................................................................................................... 14
Basic Wireless Network Settings ......................................................................................................................14
AP Isolation ......................................................................................................................................................14
High Speed Mode .............................................................................................................................................15
Wireless Network Security................................................................................................................................16
Advanced Wireless Network Settings...............................................................................................................16
Wi-Fi Multi-Media............................................................................................................................................17
WPS..................................................................................................................................................................17
WDS .................................................................................................................................................................18
MAC Filtering...................................................................................................................................................19
Firewall........................................................................................................................................................................................ 20
Access Control..................................................................................................................................................20
Advanced Filtering............................................................................................................................................20
Remote Management ........................................................................................................................................21
QoS .............................................................................................................................................................................................. 22
QoS...................................................................................................................................................................22
Application................................................................................................................................................................................ 24
Virtual Server....................................................................................................................................................24
Port Forwarding................................................................................................................................................24
DMZ .................................................................................................................................................................25
UPnP.................................................................................................................................................................25
USB Storage .....................................................................................................................................................25
USB Printer.......................................................................................................................................................26

3
Advanced Settings................................................................................................................................................................. 27
Static Routing ...................................................................................................................................................27
System Time .....................................................................................................................................................27
DDNS ...............................................................................................................................................................27
Chapter III Voice ............................................................................................................. 29
Auto-Attendant....................................................................................................................................................................... 30
Auto-Attendant and the Receptionist................................................................................................................30
Greeting ............................................................................................................................................................30
Outbound Call Transfer.....................................................................................................................................31
Magic Phone ............................................................................................................................................................................ 32
IP Extension Registration..................................................................................................................................32
Call Barring ......................................................................................................................................................32
Call Forwarding................................................................................................................................................33
Recording..........................................................................................................................................................34
Voicemail..........................................................................................................................................................35
Phone Lock.......................................................................................................................................................37
PIN....................................................................................................................................................................37
Call Hold...........................................................................................................................................................38
Call Transfer .....................................................................................................................................................39
Call Park ...........................................................................................................................................................40
Call Waiting ......................................................................................................................................................40
Call Forking......................................................................................................................................................41
Call Pickup and Pickup Deny ...........................................................................................................................42
Three-Way Calling............................................................................................................................................42
Outbound Call ......................................................................................................................................................................... 44
SIP Trunk..........................................................................................................................................................44
Dialing a Trunk Number...................................................................................................................................45
Hotline ..............................................................................................................................................................46
Speed Dialing....................................................................................................................................................47
Emergency Call and Black List.........................................................................................................................47
Digitmap...........................................................................................................................................................48
IMS...................................................................................................................................................................49
Making the Call-Answering Mode More Comfortable ........................................................................................... 50
DID...................................................................................................................................................................50
Hunting Group..................................................................................................................................................50
Secretary Extension ..........................................................................................................................................51
Distinctive Ring................................................................................................................................................52
Do not Disturb ..................................................................................................................................................52
Call Block.........................................................................................................................................................53
Chapter IV Management................................................................................................ 54
Management............................................................................................................................................................................ 55
Password...........................................................................................................................................................55
Software Upgrade .............................................................................................................................................55

4
Configuration....................................................................................................................................................55
Recover.............................................................................................................................................................56
Chapter V Appendix...................................................................................................... 57
FAQs............................................................................................................................................................................................. 58
Acronym and Abbreviation ................................................................................................................................................ 60

Chapter I Overview
5

Overview
Product Appearance
6

Device Buttons
ON/OFF
RST
WLAN
WPS
Turn on or off the WOC as required. This button takes effect after the device is
connected to the power outlet through an adaptor. Turn on the device, if the PWR
indicator blinks red and then turns to solid green, it means the WOC is started
normally.
Restore the factory default settings of the WOC. Press this button for about three
seconds until the STU and PWR indicators turn solid red.
Enable or disable the wireless network function. When the wireless function is disabled,
the wireless local area network (WLAN) indicator is off; when it is enabled, the indicator
turns to solid green.
Wi-Fi Protected Setup (WPS). This setting enables you to easily and safely connect a
wireless terminal to the WOC while saving the trouble of remembering the service set
identifier (SSID) and password. To add a terminal to the WOC wireless network, first
press this button, so the WPS indicator will blink, waiting for the connection of the
terminal, then you need to press the WPS button (or click the WPS button in the GUI)
on the wireless terminal within two minutes. If the connection is established, the WPS
indicator will stop blinking and go off.
Note: If the WPS indicator goes off after blinking three times, it means that the WPS
function fails to be enabled, and you have to enable the WPS function in the
configuration interface of the device.
Login Interface
Enter w.com in the address bar of the IE/Firefox browser to visit the login interface of WOC. The
language mode of the interface can be shifted between Chinese and English. You can access the
configuration interface with a proved username and password. The default username and password
are both admin.
Service Menu
After login, you can see the following menus:
7

Service Name
Network
Voice
Mgmt
(Management)
Status
Wizard
Function
Set network parameters such as network connection mode, wireless network
security and USB storage.
Set telephony parameters such as auto-attendant, call forwarding, 3-way
conference call.
Provide settings such as password change, software upgrade, configuration
management, system reset and restoration of the factory default settings.
Allow you to check the transmission status of network, statistics on data sending
and receiving, log management, call status, call log, and product information.
Provide guidance on quick installation of the WOC. For details, see the Quick
Start Guide.
Interface Buttons
Common buttons in the GUI are as follows:
Reboot
Logout
Go back to the home page
Save the configuration
Back to the top of the interface page
Function Description
WOC is a converged All -In-One communication device delivering multiple services developed for
small office and home users. It can connect to terminals on the Internet or local area network (LAN),
such as computer, network phone (called IP phone), smart phone, tablet PC and video surveillance
camera, through Ethernet, 3G, Wi-Fi or other broadband IP network. In addition, the WOC provides
telephone interfaces to support the connection with public telephone network, ordinary telephone
and fax machine. Integrating such functions as wireless router, office telephony system, media server
and storage sharing, this intelligent device provides you a new experience of communication.
Wireless Office – Saving Time, Efforts and Cost
The WOC provides 802.11N wireless access point to establish connections with wireless terminals
including iPad, computer, printer, fax machine and smart phone, saving the trouble of cabling.
8

Mobile Extension – In contact with your customers anytime and anywhere
The WOC supports a maxim um of eight IP extensions. After being registered in WOC through 3G
or WiFi, your iPad or smart phone can be used as an IP extension, allowing you to make or take
phone calls and enjoy rich phone features wherever you are (in the office, at home or in journey).
Storage Sharing – Timely, Effective and Convenient
WOC provides two USB2.0 interfaces for external storage devices (USB disk or mobile hard disk).
You can get remote access to the information saved in WOC external storage device.
9

10
Chapter II Network

Network Settings
WAN
The wide area network (WAN) access mode of the WOC depends on the service provided by the
network service provider.
WAN Settings
1. Click Network from the home page.
2. Click Network > WAN, and select a connection mode for the available network.
Connection Mode Introductions 3G failover
STATIC
(Fixed IP)
DHCP
(Auto config)
PPPoE(ADSL)
L2TP/PPTP
In this mode, a static IP address provided by the network service
provider is used. Parameters such as subnet mask, default gateway
and DNS server need to be set.
In this mode, IP address, subnet mask and DNS server and other
relevant information are automatically obtained from the front-end
network, and the network connection is established automatically.
In this mode, the WOC is connected to the network via ADSL
modem by means of Point-to-Point Protocol over Ethernet (PPPoE)
dial-up.
In this mode, the WOC serves as the client of virtual
private
network (VPN), providing safe access to the business network
by
dialing in to the Internet Service Provider (ISP) or connecting to the
Internet or other networks.
YES
NO
YES
NO
3G
3. Click Save.
In this mode, a 3G USB dongle needs to be inserted into the USB NO
interface of the WOC before a proper ISP is selected.
Note: After choosing the connection mode, you can check the status of the WAN connection from
Status > WAN. If the connection is successfully established, the Connection status will be displayed
as Connected.
Dual WAN with 3G Failover
When the uplink of Ethernet WAN port fails to work properly, the WOC will automatically activate
the 3G connection and switch traffics to the 3G connection. The failover occurs when the uplink of
Ethernet WAN under one of the following conditions:
When the uplink of Ethernet WAN port is down
When there is no response of ping from the gateway and the DSN server
After the connection of the wired network resumes, the WOC will automatically switch back. The 3G
link remains connected without charring traffic.
11

Configuring 3G Failover
1. Click Network from the home page.
2. Click Network > WAN. In the Setup box, set the connection mode to PPPoE (ADSL) or STATIC
(Fixed IP) and configure other parameters, then click Save.
3. Tick off Enable in the 3G failover box and click Save. After that, parameters required for the 3G
network will be displayed.
4. Click Save.
Notes
In case after failback from 3G connection to Ethernet connection the voice calls are no longer
able to make properly, you need to reboot the WOC.
If there is no 3G USB dongle installed on the WOC, after clicking the Save button the system will
prompt a message There is no 3G USB dongle and 3G failover function can not be enabled.
MAC Cloning
To prevent multiple users from sharing the broadband service, the ISP may need to identify the MAC
address of the terminal. The WOC supports MAC address cloning, in which the MAC address
identified by the ISP can be duplicated to the WAN port for network connection.
Enabling MAC Cloning
1. Click Network from the home page.
2. Click Network > WAN, and tick off the Enable option in the MAC Clone box.
3. Enter the MAC address identified by the ISP. If it happens to be the MAC address of your PC, click
Fill my MAC.
4. Click Save.
LAN
The LAN IP address needs to be configured for the WOC. The default is 192.168.10.1 and the value
can be changed as required. LAN users can access the WOC through this IP address or w.com.
LAN Settings
1. Click Network from the home page.
2. Click Network > LAN, and enter the LAN IP address and Subnet mask. If there is no special
requirement, you can use the default. The effective LAN IP address ranges from 10.0.0.0 to
10.255.255.255, 172.16.0.0 to 172.31.255.255, 192.168.0.0 to 192.168.255.255 and 169.254.0.0 to
169.254.255.255.
3. Click Save.
Note: If the LAN IP address is changed, PCs connected to the WOC by wireless or wired network
need the new IP address to access the Web GUI of the WOC or have to log in from through w.com.
12

DHCP Server
Based on the preset IP address range, the DHCP server on the WOC automatically assigns IP
addresses to terminals accessing the WOC and implementing DHCP services.
Enabling DHCP Server
1. Click Network from the home page.
2. Click Network > DHCP server, and tick off the Enable option. The start IP and end IP addresses
are generated automatically and can be changed as required. Note that the new IP addresses
should fall into the same network segment with the LAN IP address. By default, the Primary DNS
server uses the LAN IP address, and the Lease time needs to be set.
3. Click Save.
Note: Before the lease expiration, the DHCP server will not assign any IP address in use to another
terminal.
MAC Address Binding
If an IP address is bound to a MAC address, the IP address will be assigned only to the terminals with
the bound MAC address. MAC address binding can effectively prevent illegitimate users from
occupying network resources.
Settings of MAC Address Binding
1. Click Network from the home page.
2. Click Network >DHCP server, and enter the MAC address and IP address to be bound in the
MAC address binding box. The IP address must be in the same network segment with the LAN
IP address.
3. Click Save.
DHCP Clients
The DHCP client list displays the information about terminals to which the DHCP server has assigned
IP addresses, including hostname, MAC address, acquired IP address and expiration time of the IP
address.
Hostname
MAC address
IP address
Expires in
Client name.
Client MAC address.
IP address assigned to the client host by the DHCP server.
Remaining time before the IP address expires. Every IP address has an expiration
time, and the client software will automatically renew it before the expiration time.
13

Wireless Network
Basic Wireless Network Settings
Wireless terminals can get access to the Internet by connecting to the wireless network of the WOC.
Enabling/Disabling Wireless Services through WLAN Button
Wireless network can be enabled or disabled through the WLAN button on the front panel of the
WOC. If the WLAN indicator on the WOC is on, it means the wireless network is enabled,
otherwise, it is disabled.
Configuration of Basic Wireless Network Parameters
1. Click Network from the home page.
2. Click Wireless >Basic, and tick off the On option.
3. Select the Network mode based on the wireless mode of the terminal. Network modes
supported by the WOC include 802.11b/g/n. The selection of the network mode depends on the
network environment. If 802.11b and 802.11g terminals co-exist on the network, a mixed mode is
needed, and the default of 802.11b+g+n is recommended.
802.11b+g
802.11b
802.11g
802.11n
802.11b+g+n
The connection of both 802.11b and 802.11g terminals is supported, and the
maximum connection rates are 11 Mbps and 54 Mbps respectively.
Only the connection of the 802.11b terminal is supported, and the maximum
connection rate is 11 Mbps.
Only the connection of 802.11g terminal is supported and the maximum
connection rate is 54 Mbps.
Only the connection of the 802.11n terminal is supported, and the maximum
connection rate is 150 Mbps or 300 Mbps.
The connection of the 802.11b, 802.11g, and 802.11n terminals is supported, and
the maximum connection rates are 11Mbp, 54 Mbp, and 150 or 300 Mbp
respectively.
4. SSID indicates the name of the wireless network. The default is NeWOCk and can be changed as
required.
5. Select the wireless Channel. The default is Auto. If the signals are unstable, try another channel.
6. Click Save.
Note: You can view the basic information of clients on the wireless network of the WOC from
Wireless > Clients List.
AP Isolation
For the sake of information security, wireless terminals connected to the same WOC can be isolated
to prevent mutual communications. With this function, public hotspots can be set in large public
14

spaces (such as airports and hotels) to ensure safe network access.
Enabling Wireless Terminal Isolation
1. Click Network from the home page.
2. Click Wireless >Basic >AP Isolation, and tick off the Enable option.
3. Click Save.
High Speed Mode
This setting is located under Wireless >Basic. All parameters in this setting take effect only when
the network mode is 802.11n or 802.11b+g+n. The default is recommended for the following
parameters.
Operating mode
Mixed mode, which can improve the compatibility of wireless network but will
affect its throughput.
Green mode, which can increase the throughput but will affect the compatibility
and system security.
Channel bandwidth In 802.11n mode, two 20-MHz channels are bundled into a 40-MHz channel. In
real situations, the 40-MHz channel can be used as two 20-MHz channels (a
primary channel and a secondary channel). Data can be sent and received from
the 40-MHz channel or a single 20-MHz channel, which doubles the transmission
rate and improves the throughput of wireless network.
Guard interval
Modulation and
Coding Scheme
(MCS)
Reverse direction
grant (RDG)
Space time block
coding (STBC)
Aggregation MSDU
(A-MSDU)
Auto block ACK
The space transmission of wireless signals may be delayed in some occasions. If
the subsequent data block is transmitted before the previous one is processed,
the transmission of the previous data block may be affected. This parameter can
be configured to avoid such interference.
The wireless rate of 802.11n mode is configured through the index value of
Modulation and Coding Scheme (MCS). Each MCS index value corresponds to a
communication rate determined by a set of parameters.
This parameter allows the WOC to receive response packets while sending
packets.
This parameter allows the WOC to transmit multiple copies of a data stream
through antenna or other receiving means, improving data transmission
reliability.
Aggregated MAC Service Data Unit (A-MSDU) indicates a frame aggregation
mode. In this mode, multiple MSDUs are combined into one MSDU for
transmission, which reduces the amount of additional MAC head information in
each MSDU and increases the MAC-layer transmission rate.
This parameter increases the transmission rate by combining exchange
sequences.
Decline BA request This parameter increases the transmission rate by rejecting automatic block
response requests from other wireless devices.
HT disallow TKIP On the wireless network of high throughput, the encryption mode is Advanced
15

Encryption Standard (AES) or none, instead of Temporal Key Integrity Protocol
(TKIP).
Wireless Network Security
By factory default, the security mode of WOC wireless network is WPA/WPA2-PSK, with the
encryption type of TKIP&AES and the key of 12345678.
Settings of Wireless Network Key
1. Click Network from the home page.
2. Click Wireless >Security, and select the Security mode. The security mode can be selected
based on the wireless network standard supported by the wireless terminal. The most common
mode is the default of WPA/WPA2-PSK.
Wireless Network Standard WEP Protocol WPA Protocol WPA2 Protocol
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
Supported
Supported
Supported
Not supported by early
wireless terminals
Not supported by early
wireless terminals
Supported
Not supported by early
wireless terminals
Not supported by early
wireless terminals
Support
3. Select the Security mode and change the Pass phrase accordingly.If the WEPAUTO is
selected, you can directly set the wireless network key without selecting the security mode. To set
a 64-bit key, enter 10 hexadecimal characters or 5 ASCII characters; to set a 128-bit key, enter 26
hexadecimal characters or 13 ASCII characters.
4. Set the Key renewal interval,which indicates the interval at which the broadcast and multicast
keys are refreshed. The default is 3600 seconds.
5. Click Save.
Advanced Wireless Network Settings
The advanced wireless network settings are located under Network > Wireless > Advanced. The
default is recommended for the following parameters.
BG protection mode
Beacon interval
Data beacon rate (DTIM)
16
This parameter indicates a self-adjustment mechanism which helps
802.11b+g wireless clients to successfully connect to 802.11n wireless
network under complex situations. The default is Auto.
This parameter represents the amount of time between beacon
transmissions. The smaller the interval, the faster the access speed of
the wireless client; the larger the interval, the higher the data
transmission efficiency of the wireless network. The default is 100, and
you are not recommended to change the default.
This parameter indicates the interval of beacon transmission. The
default is 1.

Fragment threshold
RTS threshold
TX power
Preamble type
TX burst
Packet aggregate
IEEE 802.11H support
Wi-Fi Multi-Media
This parameter indicates the threshold for data fragmentation. When
the data size exceeds the threshold, the data packet will be fragmented
into several pieces. The default is 2346 and you are not recommended
to change the default.
When the data packet exceeds the threshold, the sender will first send
a Request to Send (RTS) and wait for the response. Upon receiving the
permission, the sender can send data packets. The default is 2347. In
the scenario where the access of long-distance client is interfered, you
can set a smaller threshold value. To ensure better AP performance, you
are not recommenced to change the default for small offices.
Indicates the distance and range that wireless signals can cover. The
default value is 100.
The value for this parameter can be Short or Long.
This parameter indicates a mechanism in which the AP attempts to
send multiple packets after receiving an ACK message from the client.
This mechanism assures the AP a higher throughput without changing
the network environment and increasing the transmission duration.
This parameter indicates that multiple small packets are aggregated
into a large packet for transmission, which can reduce the network
bandwidth to be occupied, but may reduce network performance in
the case of poor network environment or serious interference.
Only applicable to A bandwidth.
Wi-Fi Multimedia Wi-Fi multimedia (WMM) is a wireless Quality of Service (QoS) protocol, ensuring
the preferential transmission of voice and video data. To perform WMM, the
wireless client is also required to support WMM. By default, WMM is enabled.
APSD
WPS
Automatic Power Save Delivery (APSD) saves power when no data is transmitted.
Enabling this function may reduce the wireless network performance. By default,
APSD is disabled.
WPS (Wi-Fi Protected Setup) is used to establish encrypted connections between wireless client and
WOC in a simple and quick manner. You are not required to select the encryption type and set a
key for WPS. You only need to enter the PIN code or press the WPS button on the terminal.
Enabling WPS
1. Click Network from the home page.
2. Click Wireless >WPS, and tick off the Enable option.
3. Click Save.
17

Selection of WPS Setting Mode
PIN
PBC
Reset OOB
In this mode, you need to add the PIN code of the wireless client to the
Personal Identification Code box and click Start to connect. Alternatively, you
can enter the PIN code generated by the WOC into the wireless terminal to
establish the connection.
One-key encryption to establish a safe connection between the WOC and
wireless terminal, you only need to press the WPS button on the WOC (or tick off
PBC in the GUI and click Start to connect) and then press the WPS button on the
wireless terminal within two minutes.
After the Out-of-Band (OOB) button under Wireless >WPS is pressed, the WPS
client will be in an idle state and the WPS indicator will turn off. In this situation, the
wireless network of the WOC is open to the public, allowing the access of wireless
terminals without entering the password.
Note: After resetting OOB, you are recommended to re-set the security mode for the wireless
network of the WOC.
WDS
Wireless distribution system (WDS) enables the WOC to extend its wireless network coverage by
establishing connections with other routers through lazy, bridge or repeater mode.
Configuration of WDS in the GUI
1. Click Network from the home page.
2. Click Wireless >WDS. Select the WDS mode and enter the encryption type and key. If the
bridge or repeater mode is selected, the AP MAC address needs to be entered.
WDS Mode Applicable to
the Master AP
Applicable to the
Extended AP
Able to Provide
the AP Function
Remarks
Lazy
Bridge
Repeater
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
The MAC address of the
extended AP is not
required.
The MAC address of the
extended AP is required.
The MAC address of the
extended AP is required.
3. Click Save.
Example for Extending the Wireless Network Coverage in WDS: Lazy and
Repeater Modes
1. Log in to the WOC and click Network from the home page. Click Wireless > Basic,
select
802.11b+g+n as the network mode, and then select channel 11. Write down the SSID.
2. Set the encryption mode and key for WOC wireless network. If the default security mode of
18

WPA/WPA2-PSK is applied, the encryption type should be AES and the key 12345678.
3. Select Lazy as WDS mode, AES as the encryption mode and set the key to 12345678.
4. Set the SSID, operating mode, security mode, encryption type, key and channel of a router to be
identical with those on the WOC. If the WDS mode is repeater, the settings of encryption type
and key are the same with that of WOC. Click AP scanning to add the MAC address of the
WOC.
5. Disable DHCP services on the router and set the LAN port address of the router in the same
network segment with that of the WOC. After that, all configurations are completed. Reboot
both the WOC and the router.
Notes
Both the connected wireless routers are required to support WDS and come with the same SSID,
operating mode, security mode, encryption type, key, and channel.
If the WDS mode of one wireless router is Repeater, its DHCP services should be disabled, and its
LAN port address should be in the same network segment with the other one.
MAC Filtering
MAC addresses can be filtered to prevent certain terminals from joining the WLAN.
Settings of MAC Filtering
1. Click Network from the home page.
2. Click Wireless > MAC address filter, and tick off the Enable option.
3. Add MAC addresses to the Reserved MAC address table.
4. Select the Access control policies. There are two options. One option is allowing the wireless
connection based on the MAC address in the list, but prohibiting the wireless connection based
on other MAC addresses. The other option is prohibiting the wireless connection based on the
MAC address in the list, but allowing the wireless based on other MAC addresses.
5. Click Save.
Note: A maximum of 20 MAC addresses can be added to the Reserved MAC address table.
19

Firewall
Access Control
This feature controls the access of users by accepting or rejecting the connection request submitted
by the client according to the rule parameters. The connection request can be filtered based on one
or several control rules.
Setting Access Control
1. Click Network from the home page.
2. Click Firewall >Access control, set the Rules, and click Add. The filtering based on the MAC
address and source IP address can prevent a terminal from connecting to the Internet. The
filtering based on the destination IP address can prevent the access to this IP address. The
filtering based on ports can prevent the access to some services, such as WEB and File Transfer
Protocol (FTP).
3. Tick off the Enable option in the Basic settings box.
4. Select Default policy, which is a measure adopted to deal with the network packets that don’t
conform to the rule.
5. Click Save.
Notes
A maximum of 32 control rules can be added to the control rule list.
When you disfavor a certain filtering rule added to the control list, you can set it as empty.
Advanced Filtering
This feature filters network packets passing through the WOC in a more specific and precise
manner. It can filter Java applets and ActiveX applications based on contents, prevent illegitimate
websites based on URL filtering and block specified types of websites by keywords.
Setting Filtering In the GUI
1. Click Network from the home page.
2. Click Firewall > Advanced filtering.
Filtering mode
Content
URL
Keyword
20
Description
Prevent access to websites containing such content as Proxy, Java or AxtiveX.
Prevent access to a certain website. For example, when sohu.com is input to URL,
no access can be got to the website www.sohu.com or the second- and third-level
domain names of sohu.com, such as mail.sohu.com.
Prevent access to a certain type of website. For example, if sports is configured as
a keyword, no access can be got to any sports-involved websites, such as
sports.sina.com and sports.sohu.com.
Table of contents
Other Ultrative Telephone manuals