EasyManua.ls Logo

ZyXEL Communications UAG Series - Page 13

ZyXEL Communications UAG Series
323 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
UAG CLI Reference Guide
13
21.2 IP/MAC Binding Commands .........................................................................................................135
21.3 IP/MAC Binding Commands Example ..........................................................................................136
Chapter 22
Layer 2 Isolation ...............................................................................................................................137
22.1 Layer 2 Isolation Overview ............................................................................................................137
22.2 Layer 2 Isolation Commands ........................................................................................................138
22.2.1 Layer 2 Isolation White List Sub-Commands ......................................................................138
22.3 Layer 2 Isolation Commands Example .........................................................................................139
Chapter 23
IPnP....................................................................................................................................................140
23.1 IPnP Overview ..............................................................................................................................140
23.2 IPnP Commands ...........................................................................................................................140
23.3 IPnP Commands Example ............................................................................................................141
Chapter 24
Web Authentication ..........................................................................................................................142
24.1 Web Authentication Overview .......................................................................................................142
24.2 Web Authentication Commands ....................................................................................................142
24.2.1 web-auth login setting Sub-commands ...............................................................................143
24.2.2 web-auth policy Sub-commands .........................................................................................145
24.2.3 web-auth user-agreement Sub-commands .........................................................................146
24.2.4 Web Authentication Policy Insert Command Example ........................................................146
Chapter 25
Walled Garden...................................................................................................................................148
25.1 Walled Garden Overview ..............................................................................................................148
25.2 Walled Garden Commands ...........................................................................................................148
25.2.1 walled-garden rule Sub-commands .....................................................................................149
25.2.2 Walled Garden Command Example ....................................................................................149
Chapter 26
Advertisement...................................................................................................................................150
26.1 Advertisement Overview ...............................................................................................................150
26.2 Advertisement Commands ............................................................................................................150
26.2.1 Advertisement Command Example .....................................................................................150
Chapter 27
Firewall ..............................................................................................................................................151
27.1 Firewall Overview ..........................................................................................................................151
27.2 Firewall Commands ......................................................................................................................152
27.2.1 Firewall Sub-Commands .....................................................................................................154

Table of Contents

Other manuals for ZyXEL Communications UAG Series

Related product manuals