Table of Contents
NCC User’s Guide
4
3.2.3 Event Log ............................................................................................................................... 38
3.2.4 Summary Report .................................................................................................................... 39
3.3 Configure ......................................................................................................................................... 41
3.3.1 SSIDs ........................................................................................................................................ 41
3.3.2 Authentication ...................................................................................................................... 43
3.3.3 Captive Portal ....................................................................................................................... 46
3.3.4 Radio Setting ......................................................................................................................... 49
3.3.5 Load Balancing ..................................................................................................................... 51
Chapter 4
Switch..................................................................................................................................................53
4.1 Overview ......................................................................................................................................... 53
4.2 Monitor ............................................................................................................................................. 53
4.2.1 Switch ..................................................................................................................................... 53
4.2.2 Client ...................................................................................................................................... 62
4.2.3 Event Log ............................................................................................................................... 63
4.2.4 Summary Report .................................................................................................................... 64
4.3 Configure ......................................................................................................................................... 67
4.3.1 Switch Ports ............................................................................................................................ 68
4.3.2 IP Filtering ............................................................................................................................... 71
4.3.3 RADIUS Policy ......................................................................................................................... 72
4.3.4 PoE Schedule ......................................................................................................................... 73
4.3.5 Switch Configuration ............................................................................................................ 74
Chapter 5
Gateway.............................................................................................................................................78
5.1 Overview ......................................................................................................................................... 78
5.2 Monitor ............................................................................................................................................. 78
5.2.1 Security Gateway ................................................................................................................. 78
5.2.2 Client ...................................................................................................................................... 81
5.2.3 Event Log ............................................................................................................................... 84
5.2.4 VPN Connection ................................................................................................................... 84
5.2.5 Summary Report .................................................................................................................... 85
5.3 Configure ......................................................................................................................................... 88
5.3.1 Interfaces Addressing .......................................................................................................... 88
5.3.2 Firewall ................................................................................................................................... 97
5.3.3 Site-to-Site VPN .................................................................................................................... 103
5.3.4 L2TP over IPSec Client ......................................................................................................... 108
5.3.5 Captive portal ..................................................................................................................... 109
5.3.6 Network Access Method ....................................................................................................113
5.3.7 Traffic Shaping ..................................................................................................................... 115
5.3.8 Security Filtering ................................................................................................................... 116
5.3.9 My Authentication Server ................................................................................................. 116