Zyxel UAG5100 [14/361] Chapter 28 ipnp 56

Zyxel UAG5100 [14/361] Chapter 28 ipnp 56
Table of Contents
UAG CLI Reference Guide
14
27.3 Layer 2 Isolation Commands Example .........................................................................................155
Chapter 28
IPnP....................................................................................................................................................156
28.1 IPnP Overview ..............................................................................................................................156
28.2 IPnP Commands ...........................................................................................................................156
28.3 IPnP Commands Example ............................................................................................................157
Chapter 29
Web Authentication ..........................................................................................................................158
29.1 Web Authentication Overview .......................................................................................................158
29.2 Web Authentication Commands ....................................................................................................158
29.2.1 web-auth login setting Sub-commands ...............................................................................160
29.2.2 web-auth policy Sub-commands .........................................................................................161
29.2.3 web-auth type default-user-agreement Sub-commands .....................................................162
29.2.4 web-auth type default-web-portal Sub-commands ..............................................................162
29.2.5 web-auth type profile Sub-commands .................................................................................163
29.2.6 web-auth user-agreement Sub-commands .........................................................................164
29.2.7 Web Authentication Policy Insert Command Example ........................................................165
Chapter 30
Walled Garden...................................................................................................................................166
30.1 Walled Garden Overview ..............................................................................................................166
30.2 Walled Garden Commands ...........................................................................................................166
30.2.1 walled-garden rule Sub-commands .....................................................................................167
30.2.2 Walled Garden Command Example ....................................................................................167
Chapter 31
Advertisement...................................................................................................................................168
31.1 Advertisement Overview ...............................................................................................................168
31.2 Advertisement Commands ............................................................................................................168
31.2.1 Advertisement Command Example .....................................................................................168
Chapter 32
RTLS ..................................................................................................................................................169
32.1 RTLS Overview .............................................................................................................................169
32.1.1 RTLS Configuration Commands ..........................................................................................170
32.1.2 RTLS Configuration Examples ............................................................................................170
Chapter 33
Firewall ..............................................................................................................................................171
33.1 Firewall Overview ..........................................................................................................................171
33.2 Firewall Commands ......................................................................................................................172

Содержание

Похожие устройства

Скачать