beautypg.com
MH-2001 Multi-Homing Security Gateway User’s Manual
5.1
LAN ....................................................................................................................................................................... 34
5.2
WAN...................................................................................................................................................................... 35
5.3
DMZ ...................................................................................................................................................................... 40
CHAPTER 6: POLICY OBJECT ..................................................................................................................... 42
6.1
A
DDRESS
............................................................................................................................................................... 42
6.1.1 LAN............................................................................................................................................................... 42
6.1.2 LAN Group................................................................................................................................................... 44
6.1.3 WAN ............................................................................................................................................................. 45
6.1.4 WAN Group ................................................................................................................................................. 46
6.1.5 DMZ .............................................................................................................................................................. 47
6.1.6 DMZ Group.................................................................................................................................................. 49
6.1.7 Example1 ..................................................................................................................................................... 51
6.1.8 Example2 ..................................................................................................................................................... 53
6.2
S
ERVICE
................................................................................................................................................................ 56
6.2.1 Pre-defined .................................................................................................................................................. 56
6.2.2 Custom......................................................................................................................................................... 57
6.2.3 Group............................................................................................................................................................ 58
6.3
CHEDULE
............................................................................................................................................................. 60
6.4
Q
O
S....................................................................................................................................................................... 61
6.5
UTHENTICATION
................................................................................................................................................... 63
6.5.1 Auth Setting ................................................................................................................................................. 63
6.5.2 Auth User ..................................................................................................................................................... 64
6.5.3 Auth User Group ......................................................................................................................................... 67
6.5.4 Radius Server ............................................................................................................................................. 70
6.5.5 POP3 ............................................................................................................................................................ 90
6.6
C
ONTENT
B
LOCKING
............................................................................................................................................. 92
6.6.1 URL Blocking............................................................................................................................................... 92
6.6.2 Script Blocking ............................................................................................................................................ 94
6.6.3 Download Blocking..................................................................................................................................... 95
6.6.4 Upload Blocking.......................................................................................................................................... 96
6.7
IM/P2P
................................................................................................................................................ 97
6.8
V
IRTUAL
ERVER
................................................................................................................................................... 98
6.8.1 Mapped IP ................................................................................................................................................... 99
6.8.2 Virtual Server 1- 4..................................................................................................................................... 102
6.9
VPN..................................................................................................................................................................... 104
6.9.1 Example.1...................................................................................................................................................111
6.9.2 Example.2.................................................................................................................................................. 124
6.9.3 Example.3.................................................................................................................................................. 182
6.9.4 Example.4.................................................................................................................................................. 195