6.3. User Login ....................................................................................................................... 94
6.3.1. An Example of User Login ....................................................................................................... 94
6.3.2. Default Authentication .............................................................................................................. 96
6.3.3. Login with Postfix ..................................................................................................................... 96
7. Policies and Access Control ............................................................................. 97
7.1. Policy .............................................................................................................................. 97
7.1.1. Firewall ..................................................................................................................................... 99
7.1.2. Routing ................................................................................................................................... 104
7.1.3. Schedule ................................................................................................................................ 105
7.1.4. Session Limit .......................................................................................................................... 106
7.2. User Access Control ...................................................................................................... 107
7.3. Session Limit & Session Log ......................................................................................... 111
8. Users’ Login and Logout ................................................................................. 113
8.1. Before User Login ......................................................................................................... 113
8.1.1. Login with SSL ....................................................................................................................... 113
8.1.2. Internal Domain Name with Certificate .................................................................................. 114
8.1.3. Walled Garden ....................................................................................................................... 116
8.1.4. Walled Garden AD List ........................................................................................................... 117
8.1.5. Mail Message ......................................................................................................................... 119
8.2. After User Login ............................................................................................................ 120
8.2.1. Portal Home Page .................................................................................................................. 120
8.2.2. Idle Timer ............................................................................................................................... 121
8.2.3. Multiple Login ......................................................................................................................... 122
8.2.4. Change Password Privilege ................................................................................................... 123
8.2.5. Proxy Server .......................................................................................................................... 124
9. Local Area AP Management ............................................................................ 126
9.1. Multiple Type of AP ........................................................................................................ 127
9.2. Configure AP Template .................................................................................................. 128
9.3. AP Discovery ................................................................................................................. 131
9.3.1. AP Background Discovery ..................................................................................................... 133
9.4. Manually add AP ........................................................................................................... 134
9.5. AP with Service Zone .................................................................................................... 135
9.6. AP Security ................................................................................................................... 137
9.7. Change managed AP settings ....................................................................................... 138
9.8. AP Operations from AP List ........................................................................................... 141
9.8.1. Reboot, Enable, Disable and Delete the AP .......................................................................... 141
9.8.2. Apply Template ....................................................................................................................... 142
9.8.3. Apply Service Zone (Tag-Based Only) ................................................................................... 143
9.9. Firmware management and upgrade ............................................................................. 144
9.10. WDS Management ........................................................................................................ 145
9.11. Rogue AP Detection ...................................................................................................... 146
9.12. AP Load Balancing ........................................................................................................ 148
10. Wide Area AP Management ............................................................................. 151
10.1. AP Discovery ................................................................................................................. 152
10.2. Manually add AP ........................................................................................................... 153
10.3. Manage AP Lists ........................................................................................................... 154
10.4. Manage Third Party AP ................................................................................................. 156
10.5. Map ............................................................................................................................... 157
10.5.1. Register key from Google ...................................................................................................... 158
10.5.2. Create a Map ......................................................................................................................... 159
10.5.3. Marking APs on your Map ...................................................................................................... 160
10.5.4. Operations from Map page .................................................................................................... 163
10.6. AP Operations from AP List ........................................................................................... 164
10.7. WDS List ....................................................................................................................... 166
10.8. Backup Config ............................................................................................................... 167
10.9. Firmware management and upgrade ............................................................................. 168
10.10. CAPWAP ....................................................................................................................... 169
11. Networking Features of a Gateway ................................................................. 170
11.1. DMZ .............................................................................................................................. 170
11.2. Virtual Server................................................................................................................. 171