Table of Contents
UAG715 User’s Guide
10
Chapter
19
IP/MAC Binding
.................................................................................................................................
217
19.1 IP/MAC Binding Overview
.............................................................................................................
217
19.1.1 What You Can Do in this Chapter
........................................................................................
217
19.1.2 What You Need to Know
......................................................................................................
217
19.2 IP/MAC Binding Summary
............................................................................................................
218
19.2.1 IP/MAC Binding Edit
............................................................................................................
219
19.2.2 Static DHCP Edit
.................................................................................................................
220
19.3 IP/MAC Binding Exempt List
.........................................................................................................
220
Chapter
20
Web Authentication
..........................................................................................................................
223
20.1 Overview
.......................................................................................................................................
223
20.1.1 What You Can Do in this Chapter
........................................................................................
224
20.1.2 What You Need to Know
......................................................................................................
224
20.2 Web Authentication Screen
...........................................................................................................
225
20.2.1 Creating/Editing an Authentication Policy
............................................................................
228
20.3 User-aware Access Control Example
...........................................................................................
230
20.3.1 Set Up User Accounts
.........................................................................................................
230
20.3.2 Set Up User Groups
............................................................................................................
231
20.3.3 Set Up User Authentication Using the RADIUS Server
.......................................................
231
20.3.4 User Group Authentication Using the RADIUS Server
........................................................
234
20.4 Endpoint Security (EPS) Example
................................................................................................
235
20.4.1 Configure the Endpoint Security Objects
.............................................................................
235
20.4.2 Configure the Authentication Policy
.....................................................................................
237
Chapter
21
Firewall
..............................................................................................................................................
239
21.1 Overview
.......................................................................................................................................
239
21.1.1 What You Can Do in this Chapter
........................................................................................
239
21.1.2 What You Need to Know
......................................................................................................
239
21.2 The Firewall Screen
......................................................................................................................
242
21.2.1 Configuring the Firewall Screen
..........................................................................................
242
21.2.2 The Firewall Add/Edit Screen
..............................................................................................
245
21.3 The Session Limit Screen
.............................................................................................................
246
21.3.1 The Session Limit Add/Edit Screen
.....................................................................................
247
21.4 Firewall Rule Configuration Example
............................................................................................
248
21.5 Firewall Rule Example Applications
..............................................................................................
250
Chapter
22
IPSec VPN
..........................................................................................................................................
253
22.1 Virtual Private Networks (VPN) Overview
.....................................................................................
253
22.1.1 What You Can Do in this Chapter
........................................................................................
254