Unified Services Router
User Manual
7
Figure 33: OSPFv2 configured parameters
.......................................................................................................
59
Figure 34: OSPFv2 configuration
..........................................................................................................................
60
Figure 35: OSPFv3 configured parameters
.......................................................................................................
61
Figure 36: OSPFv3 configuration
..........................................................................................................................
62
Figure 37: 6 to 4 tunneling
.......................................................................................................................................
63
Figure 38: ISATAP Tunnels Configuration
.........................................................................................................
64
Figure 39: WAN3 configuration for 3G internet
................................................................................................
66
Figure 40: Physical WAN port settings
................................................................................................................
67
Figure 41: Wireless Network Setup Wizards
.....................................................................................................
69
Figure 42: List of Available Profiles shows the options available to secure the wireless link
..........
71
Figure 43: Profile configuration to set network security
.................................................................................
73
Figure 44: RADIUS server (External Authentication) configuration
..........................................................
75
Figure 45: Virtual AP configuration
.......................................................................................................................
76
Figure 46: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID
...............................................................................................................
77
Figure 47: Radio card configuration options
......................................................................................................
78
Figure 48: Wi-Fi Multimedia
....................................................................................................................................
79
Figure 49: Wireless Distribution System
.............................................................................................................
80
Figure 50: Advanced Wireless communication settings
................................................................................
82
Figure 51: WPS configuration for an AP with WPA/WPA2 profile
.............................................................
83
Figure 52: List of Available Firewall Rules
.........................................................................................................
86
Figure 53: List of Available Schedules to bind to a firewall rule
.................................................................
87
Figure 54: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30)
.............................................
90
Figure 55: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed.
...................
91
Figure 56: The IPv6 firewall rule configuration page allows you to define the To/From zone,
service, action, schedules, and specify source/destination IP addresses as needed.
.. 92
Figure 57: List of Available IPv6 Firewall Rules
...............................................................................................
93
Figure 58: Schedule configuration for the above example.
..........................................................................
96
Figure 59: List of user defined services.
.............................................................................................................
98
Figure 60: Custom Services configuration
.........................................................................................................
98
Figure 61: Available ALG support on the router.
...........................................................................................
100
Figure 62: Passthrough options for VPN tunnels
..........................................................................................
101
Figure 63: List of Available Application Rules showing 4 unique rules
..................................................
102
Figure 64: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded
......................................................................................................................
103