User's Manual

UTT Technologies Appendix F Table Index
http://www.uttglobal.com Page 427
Figure 11-1 User Status List .................................................................................................. 277
Figure 11-2 Personal Rate Limit Settings .............................................................................. 279
Figure 11-3 Personal Internet Behavior Management Settings............................................. 280
Figure 11-4 Internet Behavior Management Policy Settings ................................................. 282
Figure 11-5 Internet Behavior Management Policy List ......................................................... 286
Figure 11-6 Policy Database List ........................................................................................... 289
Figure 11-7 Policy Database Version Check ......................................................................... 290
Figure 11-8 Import Policy Database ...................................................................................... 291
Figure 11-9 Enable QQ Whitelist ........................................................................................... 292
Figure 11-10 QQ Whitelist Settings ....................................................................................... 292
Figure 11-11 QQ Whitelist ...................................................................................................... 293
Figure 11-12 Internet Management Behavior Example - Policy 1 ......................................... 296
Figure 11-13 Figure 11-9 Internet Management Behavior Example - Policy 2 ...................... 297
Figure 11-14 Internet Management Behavior Example - Policy 3 ......................................... 298
Figure 11-15 Internet Management Behavior Example - Enable QQ Whitelist ..................... 298
Figure 11-16 Internet Management Behavior Example -QQ Whitelist .................................. 299
Figure 11-17 One-Time Notice Settings - Customized Mode ................................................ 301
Figure 11-18 One-Time Notice Preview - Example ............................................................... 302
Figure 11-19 One-Time Notice Settings - URL Mode ............................................................ 303
Figure 11-20 Daily Notice Settings ........................................................................................ 304
Figure 11-21Enable Web Authentication ............................................................................... 304
Figure 11-22 Web Authentication User Account Settings ...................................................... 305
Figure 11-23 Web Authentication User Account List ............................................................. 305
Figure 11-24 Web Authentication Login Page ....................................................................... 306
Figure 11-25 Web Authentication Prompt Page .................................................................... 307
Figure 12-1 Internal Attack Defense Settings ........................................................................ 309
Figure 12-2 External Attack Defense Settings ........................................................................ 311
Figure 12-3 IP/MAC Binding List - Example One .................................................................. 315
Figure 12-4 IP/MAC Binding List - Example Two .................................................................. 316
Figure 12-5 IP/MAC Binding Settings .................................................................................... 317
Figure 12-6 IP/MAC Binding Global Setup ............................................................................ 318
Figure 12-7 IP/MAC Binding List ........................................................................................... 319
Figure 12-8 IP/MAC Binding List - Example Three ............................................................... 322
Figure 12-9 IP/MAC Binding List - Example Four ................................................................. 323
Figure 12-10 Access Control Rule Settings ........................................................................... 328
Figure 12-11 Enable Access Control ..................................................................................... 330