UTT Technologies Table of Contents
http://www.uttglobal.com Page V
10.2 FLEXIBLE BANDWIDTH MANAGEMENT ................................................................................173
10.3 P2P RATE LIMIT....................................................................................................................173
10.4 SESSION LIMITING ................................................................................................................175
CHAPTER 11 FIREWALL ....................................................................................................... 177
11.1 ATTACK PREVENTION ...........................................................................................................177
11.1.1 Internal Attack Prevention...........................................................................................177
11.1.2 External Attack Prevention..........................................................................................180
11.2 ACCESS CONTROL ................................................................................................................181
11.2.1 Introduction to Access Control....................................................................................181
11.2.2 Access Rule List..........................................................................................................183
11.2.3 Access Rule Settings ...................................................................................................184
11.2.4 Configuration Examples for Access Rule....................................................................189
11.3 DOMAIN FILTERING ..............................................................................................................195
11.3.1 Domain Filtering Global Settings................................................................................195
11.3.2 Domain Filtering Settings............................................................................................195
11.4 10.4 MACADDRESS FILTERING ...........................................................................................196
11.4.1 MAC Address Filtering List ........................................................................................197
11.4.2 MAC Address Filtering Setting...................................................................................197
CHAPTER 12 VPN................................................................................................................... 199
12.1 PPTPVPN............................................................................................................................199
12.1.1 Introduction to PPTP Implementation.........................................................................199
12.1.2 PPTP Client Settings ...................................................................................................204
12.1.3 PPTP Server Settings...................................................................................................205
12.1.4 Notes on Configuring PPTP Client and Server............................................................208
12.1.5 PPTP List.....................................................................................................................208
12.1.6 How to Add, View, Edit and Delete PPTP Clients or Server Entries...........................210
12.1.7 Configuration Example for PPTP................................................................................211
12.2 IPSEC VPN...........................................................................................................................212
12.2.1 Introduction to IPSec Implementation.........................................................................212
12.2.2 IPSec Settings–AutoKey (IKE)...................................................................................228
12.2.3 IPSec List ....................................................................................................................238
12.2.4 How to Add, View, Edit and Delete IPSec Entries ......................................................239
12.2.5 Configuration Examples for IPSec –AutoKey (IKE) .................................................240
CHAPTER 13 SYSTEM........................................................................................................... 248
13.1 ADMINISTRATOR...................................................................................................................248
13.1.1 Administrator List .......................................................................................................248
13.1.2 Administrator Settings.................................................................................................249
13.2 SYSTEM TIME .......................................................................................................................250
13.3 CONFIGURATION...................................................................................................................252
13.3.1 Backup Configuration .................................................................................................252
13.3.2 Restore Configuration .................................................................................................252