You are here: Webhelp 5.5R7 > Policy > Share Access

Share Access

Share access means multiple endpoints access network with the same IP. The function of share access can block access from unknown device and allocate bandwidth for users, so as to prevent possible risks and ensure good online experience.

Configuring Share Access Rules

To configure a share access rule, take the following steps:

  1. Select Policy > Share Access.
  2. Click New. The Share Access Configuration dialog box will appear.

  3. Option Description
    Name Specifies the name of share access rule.
    Source Zone Specify the source zone of share access.
    Source Address Specify the source IP address segment of share access.
    Schedule Specify the schedule of share access. The share access rule takes effect in the period specified by the schedule. If the schedule is not configured, the share access rule will always be effective.
    Maximum
    Endpoint
    Specify the maximum number of share access endpoints. The range is 1-15. The default value is 2.
    Action

    When the number of endpoints with the same IP address exceeds the maximum allowed to be shared by system, the IP address of the endpoints will be processed according to the specified action.

    • Log Only: When the number of shared access endpoints exceeds the maximum, system will only record logs of the IP address out of limit, without affecting the normal connection of the access endpoints.
    • Warning: When the number of shared access endpoints exceeds the maximum, system will send warnings to endpoints out of limit and record logs during the specified control duration.
      • Control Duration: Specify the control duration of warning. The range is 30-3600s. The default value is 60s. After the duration is over, the system will re-detect whether the number of access endpoints exceeds the maximum.
      • Warning Message: Specify the user-defined warning message, the range is 0-255 characters.
    • Block: When the number of shared access endpoints exceeds the maximum, system will block the IP address of the endpoints out of the limit and record logs during the specified control duration.
      • Control Duration: Specify the control duration of block. The range is 30-3600s. The default value is 60s. After the duration is over, the system will re-detect whether the number of access endpoints exceeds the maximum.
    Endpoint Timeout Specify the timeout time of endpoint. After the timeout time, when the endpoint no longer accesses network with the IP, system will clear the endpoint information. The range is 300-86400s. The default value is 600s.