User's Manual
UTT Technologies Appendix E Figure Index
http://www.uttglobal.com Page 203
Figure 8-3 Global Management Policy - Example............. ................................. .................. ..........................134
Figure 8- 4 Group Management Policy List
............................................. .................. ................................. ......
135
Figure 8- 4 Group Management Policy List (Continue)..................................... ................................. ............135
Figure 8-5 Group Management Policy Settings.................................................................... .......................137
Figure 8- 6 Group Management Policy Example - Policy 1
........................................... .................. ..............
139
Figure 8- 7 Group Management Policy Example - Policy 2........................................... ................................140
Figure 8- 8 Group Management Policy Example - Policy 3........................................... ................................141
Figure 8- 9 Group Management List – Example
........................................... .................. .................................
141
Figure 8-9 Group Management List – Example (Continue)................................ ..........................................142
Figure 9- 1 Access Rule List........................................... .................................................................. ................... 145
Figure 9- 1 Access Rule List (Continue)
............................................ .................. ................................. .............
145
Figure 9- 1 Access Rule List (Continue)................................ ................................. .................. .........................146
Figure 9- 2 Access Rule Settings - IP Filtering................................ ................................. ................................147
Figure 9-3 Access Rule Settings - URL Filtering
............................................ .................. ...............................
149
Figure 9- 4 Access Rule Settings - Keyword Filtering................................. .................. ................................. .150
Figure 9- 5 Access Rule List - Example 1................................................................................ ......................... 152
Figure 9- 5 Access Rule List - Example 1 (Continue)
........................................... .................. ........................
152
Figure 9- 5 Access Rule List - Example 1 (Continue).......... ................................. .................. ........................152
Figure 9- 6 Access Rule List - Example 2................................................................................ ......................... 153
Figure 9- 6 Access Rule List - Example 2 (Continue)
........................................... .................. ........................
153
Figure 9- 6 Access Rule List - Example 2 (Continue).......... ................................. .................. ........................154
Figure 9- 7 Access Rule List - Example 3................................................................................ ......................... 154
Figure 9- 7 Access Rule List - Example 3 (Continue)
........................................... .................. ........................
155
Figure 9- 7 Access Rule List - Example 3 (Continue).......... ................................. .................. ........................155
Figure 9- 8 Access Rule List - Example 4................................................................................ ......................... 156
Figure 9- 8 Access Rule List - Example 4 (Continue)
........................................... .................. ........................
156
Figure 9- 8 Access Rule List - Example 4 (Continue).......... ................................. .................. ........................156
Figure 9- 9 Domain Filtering Global Settings....................................... .............................................................157
Figure 9- 10 Domain Filtering Settings
........................................... .................. ................................. ................
157
Figure 9- 11 Attack Prevention Settings............. ................................. ...............................................................159
Figure 10-1 Typical Application of PPTP...................... .................. ................................. .................. ...............160
Figure 10- 2 PPTP Packet Flow
............................................. .................. ................................. .................. ........
162
Figure 10- 3 PPTP Packet Format - Static IP/DHCP Interne t Connection........................ ......................... 164
Figure 10- 4 PPTP Packet Format - PPPoE Internet Connection................................................................164
Figure 10- 5 PPTP Client Settings
............................................ .................. ................................. .................. .....
165
Figure 10 -6 PPTP Client List............................. .................. ................................. .............................................. 166
Figure 10- 6 PPTP Client List (Continue)................................................................... .......................................166