Specifications

UTT Technologies Chapter 8 User Management
http://www.uttglobal.com Page 135
Step 3 After you have added some IP/MAC bindings, you can view them in the IP/MAC
Binding List.
Step 4 If you want to block the undefined local computers from accessing the Router
and Internet, please clear the Allow Undefined LAN PCs check box; else, the
undefined local computers are allowed to access the Router and Internet.
Step 5 If you want to temporarily block a user matching an IP/MAC binding from
accessing the Router and Internet, please clear the bindings Allow check box.
After you have finished configuring IP/MAC binding feature, when receiving a packet
initiated from LAN, the Router will firstly compare the packet with the bindings in the
IP/MAC Binding List, and then process the packet according to the related configuration.
The packet will be allowed to pass or be dropped immediately. If it is allowed to pass, the
packet will be further processed by other function modules.
8.2.6 Internet Whitelist and Blacklist
8.2.6.1 Introduction to Internet Whitelist and Blacklist Based
on IP/MAC Binding
By utilizing IP/MAC binding feature, you can flexibly configure an Internet whitelist or
blacklist for the LAN users.
If you want to allow only a small number of LAN users to access the Internet, you can
configure an Internet whitelist for these users. Then all users cannot access the Internet,
except those listed in the whitelist.
If you want to block only a small number of LAN users from accessing the Internet, you
can configure an Internet blacklist for these users. Then all users can access the Internet,
except those listed in the blacklist.
On the Router, a user listed in the whitelist is a legal user, i.e., the users IP and MAC
address pair matches an IP/MAC binding whose Allow check box is checked. A user
listed in the blacklist is an illegal user, i.e., the users IP and MAC address pair matches an
IP/MAC binding whose Allow check box is cleared; or the IP address or MAC address is
the same as that of an IP/MAC binding, but not both.
8.2.6.2 How to Configure an Internet Whitelist
To configure an Internet whitelist, follow these steps: