User's Manual
UTT Technologies About This Manual
UTT Technologies http://www.uttglobal.com Page 11
Ɣ
Internet Behavior Management:
How to control and manage the
Internet behaviors of the LAN users to improve bandwidth
utilization and network security.
Ɣ
Policy Database:
How to view the policy databases related
information; and how to upload or update policy databases.
Ɣ
QQ Whitelist:
How to configure QQ whitelist feature. The LAN
users still can use the QQ numbers in the QQ whitelist to login to
QQ even if you have blocked them from using QQ by Internet
behavior management policies.
Ɣ
Notice:
How to configure notice feature. The Device can push the
notice message to the specified LAN users; and there are two
types of notices: one-time notice and daily notice.
12 Security
How to configure security features, including:
Ɣ
Attack Defense:
How to configure the internal and external attack
defense features to enhance network security.
Ɣ
IP/MAC Binding:
How to configure IP/MAC address pair bindings
to prevent IP address spoofing. By utilizing IP/MAC binding
feature, you can flexibly configure an Internet whitelist or blacklist
for the LAN users.
Ɣ
Firewall:
How to configure firewall access control rules which are
applied on the LAN interface.
Ɣ
Domain Filtering:
How to configure domain filtering feature. You
can only block certain specified domain names or only allow
certain specified domain names.
Ɣ
NAT Session Limit:
How to configure NAT session limit rules to
limit the maximum number of concurrent NAT sessions, TCP
sessions, UDP sessions, and ICMP sessions based on LAN hosts.
And you can limit different maximum sessions for different LAN
hosts.
Ɣ
Address Group:
How to configure address groups. You can