EasyManuals Logo
Home>Grandstream Networks>Network Router>GWN7000

Grandstream Networks GWN7000 User Manual

Grandstream Networks GWN7000
155 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #11 background imageLoading...
Page #11 background image
P a g e | 11
GWN7000 User Manual
Version 1.0.6.28
Figure 40: Client Bandwidth Rules .............................................................................................................. 70
Figure 41: Block a Client ............................................................................................................................. 70
Figure 42: Unban Client .............................................................................................................................. 71
Figure 43: Global Blacklist .......................................................................................................................... 71
Figure 44: Managing the Global Blacklist ................................................................................................... 71
Figure 45: Adding a MAC Access List ......................................................................................................... 72
Figure 46: Blacklist Access List ................................................................................................................... 72
Figure 47: Ban/Unban Client ....................................................................................................................... 73
Figure 48: Create CA Certificate ................................................................................................................. 75
Figure 49: CA Certificate ............................................................................................................................. 77
Figure 50: Generate Server Certificates ..................................................................................................... 78
Figure 51: User Management ..................................................................................................................... 80
Figure 52: Client Certificate......................................................................................................................... 82
Figure 53: Create OpenVPN® Server ......................................................................................................... 85
Figure 54: OpenVPN® ................................................................................................................................ 88
Figure 55: OpenVPN® Client ...................................................................................................................... 89
Figure 56: OpenVPN® Client ...................................................................................................................... 92
Figure 57: L2TP Client Configuration .......................................................................................................... 93
Figure 58: L2TP Client ................................................................................................................................ 95
Figure 59: PPTP Client Configuration ......................................................................................................... 96
Figure 60: PPTP Client ............................................................................................................................... 97
Figure 61: PPTP Server Configuration ....................................................................................................... 98
Figure 62: Branch Office IPSec Phase 1 Configuration ............................................................................ 103
Figure 63:Branch Router IPSec Phase 2 Configuration ........................................................................... 105
Figure 64: HQ Router IPSec Phase 2 Configuration ................................................................................ 106
Figure 65: Basic General Settings ........................................................................................................ 108
Figure 66: Port Forward ............................................................................................................................ 109
Figure 67: DMZ ......................................................................................................................................... 110
Figure 68: INPUT Rule Sample................................................................................................................. 112
Figure 69: Output Rules Sample ............................................................................................................... 114
Figure 70: Traffic Rules Settings ............................................................................................................... 115
Figure 71: Captive Portal Policy ................................................................................................................ 119
Figure 72: Add a New Policy ..................................................................................................................... 120
Figure 73: Authentication rules ................................................................................................................. 122
Figure 74: Captive Portal Files .................................................................................................................. 123
Figure 75: Captive Portal Clients .............................................................................................................. 124
Figure 76: Add Voucher Sample ............................................................................................................... 126
Figure 77: Vouchers List ........................................................................................................................... 126
Figure 78: Captive Portal with Voucher authentication ............................................................................. 128
Figure 79: MAC Address Bandwidth Rule ................................................................................................. 130
Figure 80: Bandwidth Rules ...................................................................................................................... 130
Figure 81: Create Blackhole Policy ........................................................................................................... 131

Table of Contents

Other manuals for Grandstream Networks GWN7000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Grandstream Networks GWN7000 and is the answer not in the manual?

Grandstream Networks GWN7000 Specifications

General IconGeneral
BrandGrandstream Networks
ModelGWN7000
CategoryNetwork Router
LanguageEnglish

Related product manuals