Firewall
..........................................................................................
28
Policy
...................................................................................................
28
Policy modes
...............................................................................................
28
Action Types
................................................................................................
28
Source and Destination Filter
......................................................................
28
Service Filter
...............................................................................................
29
Schedule
.....................................................................................................
29
Intrusion Detection / Prevention
..................................................................
30
Traffic Shaping
............................................................................................
30
Add a new policy
.........................................................................................
31
Change order of policy
................................................................................
32
Delete policy
................................................................................................
32
Configure Intrusion Detection
.....................................................................
32
Configure Intrusion Prevention
...................................................................
33
Port mapping / Virtual Servers
............................................................
34
Add a new mapping
....................................................................................
34
Delete mapping
...........................................................................................
35
Administrative users
............................................................................
36
Add Administrative User
..............................................................................
36
Change Administrative User Access level
..................................................
37
Change Administrative User Password
.......................................................
37
Delete Administrative User
..........................................................................
38
Users
...................................................................................................
39
The DFL-700 RADIUS Support
...................................................................
39
Enable User Authentication via HTTP / HTTPS
..........................................
40
Enable RADIUS Support
.............................................................................
40
Add User
.....................................................................................................
41
Change User Password
..............................................................................
41
Delete User
.................................................................................................
42
Schedules
...........................................................................................
43
Add new recurring schedule
.......................................................................
43
Add new one-time schedule
........................................................................
44
Services
..............................................................................................
45
Adding TCP, UDP or TCP/UDP Service
......................................................
45
Adding IP Protocol
......................................................................................
46
Grouping Services
......................................................................................
46
Protocol-independent settings
....................................................................
47
VPN
.....................................................................................................
48
Introduction to IPSec
...................................................................................
48
Introduction to PPTP
...................................................................................
48
Introduction to L2TP
....................................................................................
49
Point-to-Point Protocol
................................................................................
49
Authentication Protocols
.............................................................................
50
MPPE, Microsoft Point-To-Point Encryption
................................................
50
L2TP/PPTP Clients
.....................................................................................
51
L2TP/PPTP Servers
....................................................................................
52