5.1.3
On‐Demand
U
se
r
...............................................................................................................................44
5.1.4
Free
A
u
t
h
e
n
t
i
c
a
t
i
o
n
..........................................................................................................................53
5.2
User
L
o
g
i
n
...................................................................................................................................................54
5.2.1DefaultAuthentication..........................................................................................................................54
5.2.2LoginwithPostfix..................................................................................................................................54
5.2.3AnExampleofUserLogin......................................................................................................................54
6RestraintheUsers.................................................................................................................................................55
6.1
Black
L
i
s
t......................................................................................................................................................55
6.2
G
r
o
u
p...........................................................................................................................................................56
6.3Policy.............................................................................................................................................................56
6.3.1S
ch
e
d
u
l
e
..............................................................................................................................................58
6.3.2
F
i
r
e
w
a
ll
................................................................................................................................................59
6.3.3QoSP
r
o
fil
e
..........................................................................................................................................62
6.3.4Routing..................................................................................................................................................63
6.3.5UserP
r
i
v
il
e
g
e
.......................................................................................................................................70
7AccessNetworkwithout
A
u
t
h
e
n
t
i
c
a
t
i
o
n
...........................................................................................................71
7.1
D
M
Z
..............................................................................................................................................................71
7.2
Virtual
S
e
r
v
e
r
.............................................................................................................................................72
7.3
Privilege
L
i
s
t................................................................................................................................................73
7.3.1PrivilegeIP.............................................................................................................................................74
7.3.2Privilege
M
A
C
.......................................................................................................................................75
7.3.3PrivilegeIPv6.........................................................................................................................................75
7.4DisableAuthenticationinPublicZone..........................................................................................................76
8UserLoginandLogout...........................................................................................................................................77
8.1BeforeLogin..................................................................................................................................................77
8.1.1LoginwithSSL........................................................................................................................................77
8.1.2InternalDomainNamewithCertificate................................................................................................78
8.1.3WalledGarden.......................................................................................................................................81
8.1.4WalledGardenAD.................................................................................................................................82
8.2
After
L
o
g
i
n
..................................................................................................................................................83
8.2.1PortalURLaftersuccessfullogin..........................................................................................................83
8.2.2IdleTimer..............................................................................................................................................84
8.2.3MultipleLogin............................................................................................................................................85
9NetworkingFeaturesofaGateway.......................................................................................................................86
9.1IPPlugandP
l
a
y
...........................................................................................................................................86
9.2DynamicDomainNameService(DDNS)........................................................................................................87
9.3PortandIPForwarding.................................................................................................................................88