User's Manual

UTT Technologies Table of Contents
UTT Technologies http://www.uttglobal.com Page 9
11.1 User Admin............................................................................................................ 277
11.1.1 User Status List .................................................................................................. 277
11.1.2 Personal Rate Limit ............................................................................................ 279
11.1.3 Personal Internet Behavior Management ........................................................... 279
11.2 Internet Behavior Management ........................................................................... 281
11.2.1 Internet Behavior Management Policy Settings ................................................. 282
11.2.2 Internet Behavior Management Policy List ......................................................... 286
11.3 Policy Database .................................................................................................... 288
11.3.1 Introduction to Policy Database .......................................................................... 288
11.3.2 Policy Database List ........................................................................................... 289
11.3.3 Policy Database Version Check ......................................................................... 290
11.3.4 Import Policy Database ...................................................................................... 291
11.4 QQ Whitelist .......................................................................................................... 292
11.4.1 Enable QQ Whitelist ........................................................................................... 292
11.4.2 QQ Whitelist Settings ......................................................................................... 292
11.4.3 QQ Whitelist ........................................................................................................ 293
11.5 Configuration Example for Internet Behavior Management ............................ 294
11.6 Notice ..................................................................................................................... 300
11.6.1 Introduction to Notice .......................................................................................... 300
11.6.2 Notice Settings.................................................................................................... 300
11.6.2.1 One-Time Notice Settings ........................................................................................ 300
11.6.2.2 Daily Notice Settings ................................................................................................ 303
11.7 Web Authentication .............................................................................................. 304
11.7.1 Enable Web Authentication ................................................................................ 304
11.7.2 Web Authentication User Account Settings ........................................................ 305
11.7.3 Web Authentication User Account List ................................................................ 305
11.7.4 How to Use Web Authentication ......................................................................... 306
Chapter 12 Security .......................................................................................................... 308
12.1 Attack Defense ...................................................................................................... 308
12.1.1 Internal Attack Defense ...................................................................................... 308
12.1.2 External Attack Defense ...................................................................................... 311
12.2 IP/MAC Binding ..................................................................................................... 313
12.2.1 Introduction to IP/MAC Binding .......................................................................... 313
12.2.1.1 IP/MAC Overview .................................................................................................... 313
12.2.1.2 The Operation Principle of IP/MAC Binding ............................................................. 313
12.2.2 IP/MAC Binding Settings .................................................................................... 317