Specifications
UTT Technologies Table of Contents
http://www.uttglobal.com Page III
6.2.1 Disabling Wireless Security........................................................................................... 91
6.2.2 Wireless Security Settings – WEP ................................................................................. 91
6.2.3 Wireless Security Settings - WPA/WPA2 ...................................................................... 93
6.2.4 Wireless Security Settings - WPA-PSK/WPA2-PSK ..................................................... 94
6.3 WIRELESS MAC ADDRESS FILTERING .................................................................................... 96
6.3.1 MAC Address Filtering Global Settings ........................................................................ 96
6.3.2 MAC Address Filtering List .......................................................................................... 97
6.3.3 MAC Address Filtering Settings .................................................................................... 97
6.3.4 How to Configure MAC Address Filtering ................................................................... 98
6.3.5 Configuration Example for MAC Address Filtering ..................................................... 98
6.4 ADVANCED WIRELESS SETTINGS .......................................................................................... 100
6.5 WIRELESS CLIENT LIST ........................................................................................................ 102
CHAPTER 7 ADVANCED ..................................................................................................... 103
7.1 NAT AND DMZ .................................................................................................................... 103
7.1.1 Introduction to NAT Features ...................................................................................... 103
7.1.2 Port Forwarding ........................................................................................................... 105
7.1.3 NAT Rule ..................................................................................................................... 109
7.1.4 DMZ ............................................................................................................................ 115
7.2 STATIC ROUTE ...................................................................................................................... 116
7.2.1 Introduction to Static Route ......................................................................................... 116
7.2.2 Static Route List .......................................................................................................... 116
7.2.3 Static Route Settings.................................................................................................... 117
7.2.4 How to Add Static Routes ........................................................................................... 118
7.3 POLICY ROUTING .................................................................................................................. 119
7.3.1 Policy Routing Settings ............................................................................................... 120
7.3.2 Enable Policy Routing ................................................................................................. 122
7.3.3 Policy Routing List ...................................................................................................... 122
7.4 ANTI-NETSNIPER.................................................................................................................. 123
7.5 PLUG AND PLAY .................................................................................................................... 123
7.5.1 Introduction to Plug and Play ...................................................................................... 123
7.5.2 Enable Plug and Play ................................................................................................... 124
7.6 SYSLOG ................................................................................................................................ 125
7.7 SNMP .................................................................................................................................. 125
CHAPTER 8 USER MANAGEMENT ................................................................................... 127
8.1 USER STATUS ........................................................................................................................ 127
8.1.1 User Application Analysis Pie Charts .......................................................................... 127
8.1.2 User Status List ........................................................................................................... 128
8.2 IP/MAC BINDING ................................................................................................................. 129
8.2.1 Introduction to IP/MAC Binding ................................................................................. 130
8.2.2 IP/MAC Binding Global Settings ................................................................................ 131
8.2.3 IP/MAC Binding List .................................................................................................. 132