Wireless Controller
User Manual
11
Figure 139: SSLVPN Settings
..............................................................................................................................
247
Figure 140: Group login policies options
..........................................................................................................
248
Figure 141: Browser policies options
.................................................................................................................
249
Figure 142: IP policies options
.............................................................................................................................
250
Figure 143: Available Users with login status and associated Group
....................................................
251
Figure 144: User Configuration options
............................................................................................................
253
Figure 145: List of SSL VPN polices (Global filter)
.......................................................................................
254
Figure 146: SSL VPN policy configuration
.......................................................................................................
255
Figure 147: List of configured resources, which are available to assign to SSL VPN policies
......
257
Figure 148: List of Available Applications for SSL Port Forwarding
........................................................
260
Figure 149: SSL VPN client adapter and access configuration
................................................................
261
Figure 150: Configured client routes only apply in split tunnel mode
.....................................................
263
Figure 151: SSL VPN Portal configuration
.......................................................................................................
265
Figure 152: List of current Active VPN Sessions
...........................................................................................
266
Figure 153: USB Device Detection
.....................................................................................................................
269
Figure 154: USB Share Port
.................................................................................................................................
270
Figure 155: Certificate summary for IPsec and HTTPS management
...................................................
272
Figure 156: Intet
®
AMT
............................................................................................................................................
273
Figure 157: Wireless Configuration
.....................................................................................................
276
Figure 158: Distributed Tunneling
........................................................................................................
279
Figure 159: Distributed Tunneling Clients
......................................................................................
280
Figure 160: Peer Controller Configuration Request Status
...............................................
281
Figure 161: Peer Controller Configuraiton
.....................................................................................
283
Figure 162: WIDS AP Configuration
....................................................................................................
288
Figure 163: WIDS Client Configuration
.............................................................................................................
291
Figure 164: Remote Management
......................................................................................................................
292
Figure 165: SNMP Users, Traps, and Access Control
................................................................................
294
Figure 166: SNMP system information for this controller
...........................................................................
295
Figure 167: SNMP Traps
.......................................................................................................................................
296
Figure 168: Date, Time, and NTP server setup
.............................................................................................
299
Figure 169: Facility settings for Logging
...........................................................................................................
301
Figure 170: Log configuration options for traffic through controller
.........................................................
303
Figure 171: E-mail configuration as a Remote Logging option
.................................................................
305
Figure 172: Syslog server configuration for Remote Logging (continued)
............................................
306
Figure 173: VPN logs displayed in GUI event viewer
..................................................................................
307
Figure 174: SSL VPN logs displayed in GUI event viewer
.........................................................................
308