Page 46 / 93 Scroll up to view Page 41 - 45
4
6
Using the Configuration Utility (continued)
Group Profile > Specific Route Profiles
If you want networks to have
access to each other, you
should add a specific route in
the DSA-5100.
Name the specific route profile.
Profile Name:
Subnet Netmask:
Specifies the target network or
host IP
Destination IP Address:
Gateway IP Address:
Specifies the target subnet
mask.
Specifies the IP address of the next hop router.
Caution:
To allow two machines to access data from each other,
add a static route to the next connected router in order to send all
packets back to the DSA-5100.
After the static route is changed, it is necessary to restart the
DSA-5100 to enable the static route.
Page 47 / 93
4
7
Using the Configuration Utility (continued)
Group Profile > Login Schedule Profiles
The user’s login schedule can be
set. After durations are defined,
please click
Apply
to save the
settings in the DSA-5100.
Network Configuration > Network Address Translate
DMZ
If you have several IP addresses,
you can assign them to the WAN
port of the system. You can define
at most 40 Public IPs for the
corresponding combination at the
Ethernet end (Virtual IP Address)
and WAN end (Public IP Address).
The WAN port of the system will
automatically set the public address
defined here. These settings will be
effective immediately after you click
the
Apply
button.
Virtual Server
The function of this item permits you
to define at most 40 virtual servers,
so that computers may access LAN
resources from the WAN interface.
The Virtual Server function also
allows one to specify the type of
traffic allowed, TCP, UDP or both.
These settings will be effective
immediately after you click
Apply
.
Page 48 / 93
4
8
Using the Configuration Utility (continued)
IP Pass Through Configuration
Network Configuration > Network Address Translate (continued)
When any user attempts
to
connect
to
a
destination defined in
this
interface,
the
connection packet will
be converted to the
c o r r e s p o n d i n g
destination. You can
define up to 40 groups
for redirection on this
interface. These settings
will
be
effective
immediately after you
click
Apply
.
Network Configuration > Privilege List
Port and IP Redirect
To permit a specific
device at the user end to
have network access
without going through
authentication, you only
need to key in the IP
address of the user on
this interface. This
system permits at most
100 IP addresses to
have network access
without going through
authentication. These
settings will be effective
immediately after you
click
Apply
.
Warning:
Permitting specific IP addresses to have network access
rights without going through authentication may cause security
problems.
Page 49 / 93
49
Using the Configuration Utility (continued)
Network Configuration > MAC Pass Through Configuration
You can also bypass
authentication based on
the MAC address at the
user end. Please enter
the MAC address of the
user on this interface.
This system permits at
most 100 MAC
addresses to have
network access rights
without going through
authentication. The
format of the MAC
address is
XX:XX:XX:XX:XX:XX.
These settings will be effective immediately after you click
Apply
.
Warning:
Permitting specific MAC addresses to have access rights
without going through authentication may cause security problems.
Network Configuration > Monitor IP List
The system will send out the packet regularly to monitor the connection
status of the IP addresses on the list. If the monitored IP address does
not respond, the system will
send an e-mail to the
administrator. After enter
the related information
and click Apply, these
settings will be effective
immediately. You can
click Monitor to check
the current status of all
the monitored IP. The
system provides 40 IP
addresses a most on the
"Monitor IP List" to set.
Page 50 / 93
5
0
Using the Configuration Utility (continued)
Network Configuration > Monitor IP List (continued)
Notify Configuration
From:
The e-mail address of the administrator server in charge of the monitoring.
To:
The e-mail address of the user of the IP address under the monitoring.
Interval:
The time interval to send the e-mail report.
SMTP Server:
The IP address of the SMTP server.
Auth Method:
Providing 5 authentication methods: None, PLAIN, LOGIN,
CRAM-MD5, and NTLMv1.
> NTLMv1 is not currently available for general use.
> PLAIN and CRAM-MD5 are standardized authentication mechanisms, while Login
and NTLM are Microsoft proprietary mechanisms. Only PLAIN and LOGIN can use
the UNIX login password. Netscape uses PLAIN. Outlook and Outlook express
default to using LOGIN, although they can be set to use NTLMv1.
> Pegasus uses CRAM-MD5 or LOGIN but you are not able to configure which to
use.
> Eudora possibly uses NTLMv1, perhaps LOGIN that have not been verified.
Network Configuration > Free Surfing Area
The Free Surfing Area permits users to logon to certain websites or Domains before
passing through
authentication. You can enter up to 20 IP addresses (or Domain
Names) into the Free Surfing Area. This function allows you to provide potential users
a free network experience, while introducing them to your site. All unauthenticated
requests to servers not on the list will be dropped.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top