User's Manual

Cipherium Repeater
Administrators Manual
ii
4.3. Change admin password of Console interface ............................................29
4.4. Reload factory default of Console interface.................................................30
4.5. Restart Cipherium Repeater ........................................................................30
5. Web Management Interface ........................................................ 31
5.1. System Configuration...................................................................................31
5.1.1. Configuration Wizard...........................................................................32
5.1.2. System Information..............................................................................45
5.1.3. WAN Configuration..............................................................................47
5.1.4. Authentication Configuration ...............................................................49
5.1.5. Private Configuration ...........................................................................61
5.2. User Authentication ......................................................................................64
5.2.1 Authentication Policy.................................................................................64
5.2.2 Group Configuration..................................................................................75
5.2.3 Black List Configuration ...........................................................................76
5.2.4 Guest User Configuration ........................................................................78
5.2.5 Roaming Configuration ............................................................................79
5.2.6 Additional Configuration...........................................................................81
5.2.7 On-demand User Configuration...............................................................86
5.3 Group Profile ................................................................................................90
5.3.1 Firewall Profile .........................................................................................91
5.3.2 Specific Route Profiles.............................................................................93
5.3.3 Login Schedule Profiles ...........................................................................95
5.4 Network Configuration..................................................................................95
5.4.1 Network Address Translate......................................................................95
5.4.2 Privilege List.............................................................................................98
5.4.3 Monitor IP List ........................................................................................100
5.4.4 Walled Garden List ................................................................................102
5.4.5 Proxy Server Properties.........................................................................103
5.4.6 Dynamic DNS ........................................................................................104
5.5 Utilities........................................................................................................105
5.5.1 Change Password .................................................................................105
5.5.2 Backup / Restore Strategy.....................................................................106