Table of Contents
UAG CLI Reference Guide
13
21.2 IP/MAC Binding Commands .........................................................................................................135
21.3 IP/MAC Binding Commands Example ..........................................................................................136
Chapter 22
Layer 2 Isolation ...............................................................................................................................137
22.1 Layer 2 Isolation Overview ............................................................................................................137
22.2 Layer 2 Isolation Commands ........................................................................................................138
22.2.1 Layer 2 Isolation White List Sub-Commands ......................................................................138
22.3 Layer 2 Isolation Commands Example .........................................................................................139
Chapter 23
IPnP....................................................................................................................................................140
23.1 IPnP Overview ..............................................................................................................................140
23.2 IPnP Commands ...........................................................................................................................140
23.3 IPnP Commands Example ............................................................................................................141
Chapter 24
Web Authentication ..........................................................................................................................142
24.1 Web Authentication Overview .......................................................................................................142
24.2 Web Authentication Commands ....................................................................................................142
24.2.1 web-auth login setting Sub-commands ...............................................................................143
24.2.2 web-auth policy Sub-commands .........................................................................................145
24.2.3 web-auth user-agreement Sub-commands .........................................................................146
24.2.4 Web Authentication Policy Insert Command Example ........................................................146
Chapter 25
Walled Garden...................................................................................................................................148
25.1 Walled Garden Overview ..............................................................................................................148
25.2 Walled Garden Commands ...........................................................................................................148
25.2.1 walled-garden rule Sub-commands .....................................................................................149
25.2.2 Walled Garden Command Example ....................................................................................149
Chapter 26
Advertisement...................................................................................................................................150
26.1 Advertisement Overview ...............................................................................................................150
26.2 Advertisement Commands ............................................................................................................150
26.2.1 Advertisement Command Example .....................................................................................150
Chapter 27
Firewall ..............................................................................................................................................151
27.1 Firewall Overview ..........................................................................................................................151
27.2 Firewall Commands ......................................................................................................................152
27.2.1 Firewall Sub-Commands .....................................................................................................154