User Guide
LateralAccessDevice
 

User Guide

Table of Contents

About This User Guide

Chapter 1: Introduction / Meet LAD

Chapter 2: Installation

Chapter 2-1: Installation Tips

Chapter 2-2: Logging Into LAD

Chapter 2-3: Connecting to the Internet

Chapter 3: The Main Menu

Chapter 4: Configuring a Wireless Network

Chapter 5: Connecting and Managing Clients

Chapter 5-1: Groups

Chapter 5-2: Ports

Chapter 6: SIP Server / VoIP PBX

Chapter 6-1: SIP Accounts

Chapter 6-2: Call Routing

Chapter 6-3: Call Queues

Chapter 6-4: Voicemail Boxes / VM Menus

Chapter 6-5: Conference Rooms

Chapter 6-6: SIP Switches

Chapter 6-7: Call Logs

Chapter 6-8: Audio Files

Chapter 6-9: Call Routing & Processing Examples

Chapter 7: Access Controls / Parental Controls

Chapter 8: Scheduling

Chapter 9: Ping Monitors

Chapter 10: Network Security / LateralFirewall

Chapter 11: DNS Server and LateralDNS

Chapter 12: Reports

Chapter 13: Ethernet Packet Capture

Chapter 14: Wireless Packet Capture, Monitoring and Reports

Chapter 15: Settings, NAT Forwarding / Port Mapping and Sys Info

Chapter 16: LPN Membership

Chapter 17: Troubleshooting

Network Security / LateralFirewall

In addition to the Access Controls explained in Chapter 7, LAD incorporates LateralFirewall technology, which lets you firewall your network from the outside and inside, by segregating your local devices from one another within the network as well as from the Internet.

By default devices are not allowed access to other devices on the local network. To enable local access for a specific device, go to the device’s settings page and checkmark “Allow Local Access” (remember to save settings before exiting the page). This makes the individual device locally discoverable and accessible. For two separate devices to be able to find each other on the network, both must have “Allow Local Access” checkmarked.

As discussed in the Introduction under "Possible Topologies Using LAD," placing an intervening device (such as a switch or router) between LAD and a client device would weaken LAD's ability to monitor, control and segregate the traffic of the individual client devices connected to the intervening router or switch. LAD's LateralFirewall capabilities are strongest for the client devices that are directly connected to LAD.

 

 

 

 

 

 

 

 

 

 

 

 

 

<< Ping Monitors | DNS Server >>