Overview of Policy and Authentication Overrides
How to apply network policies, walled gardens, and authentication systems directly to a Sputnik-powered device. (See "SputnikNet Network Policies" for more information.)
Log into SputnikNet, then select Routers under the CONFIG menu.
Selecting a Sputnik-Powered device.
Setting policy and authentication overrides.
Overriding policies and authentication systems.
Select walled garden rules, other network policies, and authentication systems that you wish to apply directly to the device. Click "Save Overrides" to apply your changes.
Typically, policies and authentication systems are applied to a Sputnik-powered device through the captive portal assigned to it. However, in some cases you may want to apply them directly to the Sputnik-powered device, in which case they override (in the case of network policies) or supplement (in the case of authentication systems) captive portal settings.
Typically the only type of network policy applied directly to Sputnik-powered devices are port forwarding rules, which could, for example, enable you to remotely log into the web management interface of a device (say a security camera) on the Sputnik wireless local area network.
For more information about network policies, see "SputnikNet Network Policies".