• Home
    • Introduction
    • Exinda system components
    • The Exinda product line
    • Using this help
    • Download help in PDF
    • Copyright
    • Safety and Compliance
    • Disclaimer
  • Getting started
    • WUI Guided Tour
    • Deployment options
    • Upgrading and downgrading
    • Installing an Exinda Appliance
    • Managing multiple appliances with the Exinda Management Center
  • Using
    • Defining a network environment
    • Monitoring your network
    • Exinda Solution Center
    • Managing network traffic
    • Configuring for common use cases and scenarios
    • Managing Exinda Appliances with EMC
    • Service Delivery Point (SDP)
    • Introduction
  • Settings
    • Network settings
    • System Setup
    • Certificates
    • Optimization services
    • Authentication
    • System Maintenance
    • System Tools
  • Troubleshooting
    • Diagnostics
    • Log Files
    • Troubleshoot problems with MAPI acceleration
    • Troubleshoot issues with TCP acceleration
    • Troubleshoot issues with SMB file acceleration
    • Troubleshoot issues with Active Directory configuration
    • Troubleshooting Edge Cache
    • Topology troubleshooting
  • CLI
    • Using the Command Line Interface
    • CLI Commands
  • All Files
  • All Files
Using  >  Configuring for common use cases and scenarios  >  Monitoring and controlling traffic in a captive portal system

Monitoring and controlling traffic in a captive portal system

Integrating your Exinda Appliance with a captive portal

Creating a virtual circuit for authenticated users

Creating a virtual circuit for unauthenticated users

Creating policies to filter for authenticated users with no virtual circuit available

Creating policies that redirect traffic

Creating policies that block unwanted unauthenticated traffic

Book a demo›

Related Topics

  • Configuring for common use cases and scenarios
    • Monitoring and controlling traffic in a captive portal system
      • Integrating your Exinda Appliance with a captive portal
      • Creating a virtual circuit for authenticated users
      • Creating a virtual circuit for unauthenticated users
      • Creating policies to filter for authenticated users with no virtual circuit available
      • Creating policies that redirect traffic
      • Creating policies that block unwanted unauthenticated traffic
    • Backhauling Internet traffic
    • Setting and enforcing quotas
    • Creating Applications from DSCP-marked traffic (like Riverbed accelerated traffic)
    • Clustering and high availability
    • Controlling anonymous proxy traffic
Exinda Network Orchestrator Help System
  • Home
  • |
  • PDF
  • |
  • Disclaimer
Copyright © GFI Software 2021
Free Trial›

Feedback

Close

Share

  • Facebook
    ›
    Twitter
    ›
    Google+
    ›
    LinkedIn
    ›
Close