Unified Services Router
User Manual
8
Figure 65: Two trusted domains added to the Approved URLs List
.......................................................
104
Figure 66: One keyword added to the block list
.............................................................................................
105
Figure 67: Export Approved URL list
.................................................................................................................
106
Figure 68: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured
............................................................................................................................
107
Figure 69: Intrusion Prevention features on the router
................................................................................
108
Figure 70: Protecting the router and LAN from internet attacks
...............................................................
109
Figure 71: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet
.........................................................................................................................................
111
Figure 72: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway
.......................................................................................................................................
112
Figure 73: VPN Wizard launch screen
..............................................................................................................
113
Figure 74: IPsec policy configuration
.................................................................................................................
116
Figure 75: IPsec policy configuration continued (Auto policy via IKE)
...................................................
117
Figure 76: IPsec policy configuration continued (Auto / Manual Phase 2)
...........................................
119
Figure 77: PPTP tunnel configuration
–
PPTP Client
...................................................................................
121
Figure 78: PPTP VPN connection status
..........................................................................................................
121
Figure 79: PPTP tunnel configuration
–
PPTP Server
.................................................................................
122
Figure 80: L2TP tunnel configuration
–
L2TP Server
...................................................................................
123
Figure 81: OpenVPN configuration
.....................................................................................................................
125
Figure 82: OpenVPN Remote Network
.............................................................................................................
126
Figure 83: OpenVPN Authentication
..................................................................................................................
127
Figure 84: Example of clientless SSL VPN connections to the DSR
......................................................
130
Figure 85: List of groups
.........................................................................................................................................
131
Figure 86: User group configuration
...................................................................................................................
132
Figure 87: SSLVPN Settings
.................................................................................................................................
133
Figure 88: Group login policies options
.............................................................................................................
134
Figure 89: Browser policies options
...................................................................................................................
135
Figure 90: IP policies options
................................................................................................................................
136
Figure 91: Available Users with login status and associated Group
.......................................................
137
Figure 92: User configuration options
................................................................................................................
138
Figure 93: List of SSL VPN polices (Global filter)
..........................................................................................
139
Figure 94: SSL VPN policy configuration
.........................................................................................................
140
Figure 95: List of configured resources, which are available to assign to SSL VPN policies
........
142
Figure 96: List of Available Applications for SSL Port Forwarding
..........................................................
144
Figure 97: SSL VPN client adapter and access configuration
..................................................................
145