Specifications
UTT Technologies Table of Contents
http://www.uttglobal.com Page V
10.2 FLEXIBLE BANDWIDTH MANAGEMENT ................................................................................ 173
10.3 P2P RATE LIMIT.................................................................................................................... 173
10.4 SESSION LIMITING ................................................................................................................ 175
CHAPTER 11 FIREWALL ....................................................................................................... 177
11.1 ATTACK PREVENTION ........................................................................................................... 177
11.1.1 Internal Attack Prevention ........................................................................................... 177
11.1.2 External Attack Prevention .......................................................................................... 180
11.2 ACCESS CONTROL ................................................................................................................ 181
11.2.1 Introduction to Access Control .................................................................................... 181
11.2.2 Access Rule List .......................................................................................................... 183
11.2.3 Access Rule Settings ................................................................................................... 184
11.2.4 Configuration Examples for Access Rule .................................................................... 189
11.3 DOMAIN FILTERING .............................................................................................................. 195
11.3.1 Domain Filtering Global Settings ................................................................................ 195
11.3.2 Domain Filtering Settings ............................................................................................ 195
11.4 10.4 MAC ADDRESS FILTERING ........................................................................................... 196
11.4.1 MAC Address Filtering List ........................................................................................ 197
11.4.2 MAC Address Filtering Setting ................................................................................... 197
CHAPTER 12 VPN ................................................................................................................... 199
12.1 PPTP VPN ............................................................................................................................ 199
12.1.1 Introduction to PPTP Implementation ......................................................................... 199
12.1.2 PPTP Client Settings ................................................................................................... 204
12.1.3 PPTP Server Settings ................................................................................................... 205
12.1.4 Notes on Configuring PPTP Client and Server............................................................ 208
12.1.5 PPTP List ..................................................................................................................... 208
12.1.6 How to Add, View, Edit and Delete PPTP Clients or Server Entries ........................... 210
12.1.7 Configuration Example for PPTP ................................................................................ 211
12.2 IPSEC VPN ........................................................................................................................... 212
12.2.1 Introduction to IPSec Implementation ......................................................................... 212
12.2.2 IPSec Settings–AutoKey (IKE) ................................................................................... 228
12.2.3 IPSec List .................................................................................................................... 238
12.2.4 How to Add, View, Edit and Delete IPSec Entries ...................................................... 239
12.2.5 Configuration Examples for IPSec – AutoKey (IKE) ................................................. 240
CHAPTER 13 SYSTEM ........................................................................................................... 248
13.1 ADMINISTRATOR ................................................................................................................... 248
13.1.1 Administrator List ....................................................................................................... 248
13.1.2 Administrator Settings ................................................................................................. 249
13.2 SYSTEM TIME ....................................................................................................................... 250
13.3 CONFIGURATION ................................................................................................................... 252
13.3.1 Backup Configuration ................................................................................................. 252
13.3.2 Restore Configuration ................................................................................................. 252