13.6.5 Basic user rules configuration algorithm ................................................................. 485
13.6.6 Basic user rules configuration example................................................................... 494
13.6.7 Extended user rules configuration algorithm........................................................... 495
13.6.8 Extended user rules configuration example............................................................. 496
13.7 Eltex Distribution Manager interaction configuration..................................................496
13.7.1 Basic configuration algorithm................................................................................... 497
13.7.2 Configuration example .............................................................................................. 501
13.8 Content filtering service configuration .........................................................................503
13.8.1 Basic configuration algorithm................................................................................... 503
13.8.2 Content filtering rules configuration example ......................................................... 508
13.9 Antispam service configuration....................................................................................511
13.9.1 Basic configuration algorithm................................................................................... 511
13.9.2 Configuration example .............................................................................................. 514
14 Redundancy management ............................................................................................... 516
14.1 VRRP configuration........................................................................................................516
14.1.1 Configuration algorithm ............................................................................................ 516
14.1.2 Configuration example 1 ........................................................................................... 520
14.1.3 Configuration example 2 ........................................................................................... 521
14.2 Tracking configuration ..................................................................................................522
14.2.1 Configuration algorithm ............................................................................................ 522
14.2.2 Configuration example .............................................................................................. 526
14.3 Firewall/NAT failover configuration..............................................................................528
14.3.1 Configuration algorithm ............................................................................................ 528
14.3.2 Configuration example .............................................................................................. 530
14.4 DHCP failover configuration..........................................................................................533
14.4.1 Configuration algorithm ............................................................................................ 533
14.4.2 Configuration example .............................................................................................. 534
15 Remote access configuration .......................................................................................... 539
15.1 Configuring server for remote access to corporate network via PPTP protocol.......539
15.1.1 Configuration algorithm ............................................................................................ 539
15.1.2 Configuration example .............................................................................................. 542
15.2 Configuring server for remote access to corporate network via L2TP protocol .......544
15.2.1 Configuration algorithm ............................................................................................ 544
15.2.2 Configuration example .............................................................................................. 547
15.3 Configuring server for remote access to corporate network via OpenVPN
protocol ..........................................................................................................................549
15.3.1 Configuration algorithm ............................................................................................ 549
15.3.2 Configuration example .............................................................................................. 552