EasyManua.ls Logo

Tenda W15E - Page 8

Tenda W15E
191 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
8.4.3 Verification ........................................................................................................................................ 88
9 VPN Service ........................................................................................................................................................ 89
9.1 PPTP/L2TP Client .......................................................................................................................................... 89
9.2 PPTP/L2TP Server ......................................................................................................................................... 91
9.3 IPSec ............................................................................................................................................................. 93
9.4 Example of PPTP/L2TP Configuration .......................................................................................................... 97
9.4.1 Networking requirement .................................................................................................................. 97
9.4.2 Solution ............................................................................................................................................. 97
9.4.3 Configuration procedure ................................................................................................................... 98
9.4.4 Verification ...................................................................................................................................... 101
9.5 Example of IPSec Configuration ................................................................................................................. 104
9.5.1 Networking requirement ................................................................................................................ 104
9.5.2 Solution ........................................................................................................................................... 104
9.5.3 Configuration procedure ................................................................................................................. 104
9.5.4 Verification ...................................................................................................................................... 107
10 Security .................................................................................................................................................... 108
10.1 IP-MAC Binding ........................................................................................................................................ 108
10.1.1 Overview ....................................................................................................................................... 108
10.1.2 Adding an IP-MAC Binding Rule .................................................................................................... 109
10.1.3 Example of IP-MAC Binding .......................................................................................................... 110
10.2 Firewall ..................................................................................................................................................... 113
11 Captive Portal ........................................................................................................................................... 115
11.1 Basic Settings ........................................................................................................................................... 115
11.1.1 Overview ....................................................................................................................................... 115
11.1.2 Enabling Captive Portal ................................................................................................................. 116
11.2 User Management ................................................................................................................................... 117
11.2.1 Overview ....................................................................................................................................... 117
11.2.2 Adding Authentication-free Host .................................................................................................. 118
11.2.3 Adding a Web Account.................................................................................................................. 119
11.3 Example of Web Authentication .............................................................................................................. 120
11.3.1 Networking requirement .............................................................................................................. 120
11.3.2 Solution ......................................................................................................................................... 120
11.3.3 Configuration procedure ............................................................................................................... 120

Table of Contents

Related product manuals