User's Manual
UTT Technologies Chapter 12 Security
http://www.uttglobal.com Page 336
Figure 12-17 The Access Control Rule 2 Settings - Example 1
3
˅
Enabling Access Control
You should enable access control feature to let access control rules take effect, see Figure
12-18.
Figure 12-18 Enable Access Control - Example 1
12.3.5.2 Example Two
1. Requirements
A company uses the Device as a network access device. The requirements are as follows:
1) Block an outside user with IP address 202.106.11.22 from attacking a LAN user with