User's Manual
Administrator’s Manual
ii
4.2. Utilities for network debugging.....................................................................29
4.3. Change admin password .............................................................................30
4.4. Reload factory default ..................................................................................31
4.5. Restart..........................................................................................................31
5. Web Management Interface ........................................................ 32
5.1. System Configuration...................................................................................32
5.1.1. Configuration Wizard...........................................................................33
5.1.2. System Information..............................................................................43
5.1.3. WAN Configuration..............................................................................45
5.1.4. Authentication Configuration ...............................................................47
5.1.5. Private Configuration...........................................................................57
5.2. User Authentication ......................................................................................59
5.2.1 Authentication Policies..............................................................................60
5.2.2 Group Configuration..................................................................................67
5.2.3 Black List Configuration ...........................................................................68
5.2.4 Roaming Configuration ............................................................................69
5.2.5 Additional Configuration...........................................................................71
5.2.6 On-demand User Configuration...............................................................75
5.3 Group Profile ................................................................................................79
5.3.1 Firewall Profile .........................................................................................80
5.3.2 Login Schedule Profiles ...........................................................................82
5.4 Network Configuration..................................................................................83
5.4.1 Network Address Translate......................................................................83
5.4.2 Privilege List.............................................................................................85
5.4.3 Monitor IP List..........................................................................................87
5.4.4 Walled Garden List ..................................................................................89
5.4.5 Proxy Server Properties...........................................................................90
5.4.6 Dynamic DNS ..........................................................................................91
5.5 Utilities..........................................................................................................91
5.5.1 Change Password ...................................................................................91
5.5.2 Backup / Restore Strategy.......................................................................92