D-Link DSR-150N DSR-150 User Manual - Page 5

Unified Services Router - manual

Page 5 highlights

Unified Services Router User Manual Chapter 4. Wireless Access Point Setup ...68 4.1 4.1.1 4.1.2 4.1.3 Wireless Settings Wizard 68 Wireless Network Setup Wizard 69 Add Wireless Device with WPS 69 Manual Wireless Net work Setup 70 4.2 4.2.1 4.2.2 4.2.3 Wireless Profiles...70 WEP Security ...71 WPA or WPA2 with PSK 73 RADIUS Authentication ...73 4.3 Creating and Using Access Points 75 4.3.1 Primary benefits of Virtual APs 77 4.4 Tuning Radio Specific Settings 78 4.5 WMM...79 4.6 Wireless distribution system (WDS 80 4.7 Advanced Wireless Settings 81 4.8 Wi-Fi Protected Setup (WPS 82 Chapter 5. Securing the Private Network ...85 5.1 Firewall Rules ...85 5.2 Defining Rule Schedules 86 5.3 Configuring Firewall Rules 87 5.4 Configuring IP v6 Firewall Rules 92 5.4.1 Firewall Rule Configuration Examples 93 5.5 Security on Custom Servic es 97 5.6 ALG support ...99 5.7 VPN Passthrough for Firewall 100 5.8 Application Rules ...101 5.9 5.9.1 5.9.2 5.9.3 5.9.4 Web Content Filtering...102 Cont ent Filtering ...102 Approved URLs ...103 Blocked Keywords ...104 Export Web Filter ...105 5.10 IP/MAC Binding ...106 5.11 Intrusion Prevention (IPS 107 5.12 Protecting from Internet Attacks 108 Chapter 6. IPsec / PPTP / L2TP VPN ...111 6.1 VPN Wizard ...113 6.2 Configuring IPsec Policies 115 6.2.1 Extended Aut hentication (XAUTH 119 6.2.2 Internet over IPS ec tunnel 120 6.3 Configuring VPN clients 120 6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 PPTP / L2TP Tunnels ...120 PPTP Tunnel Support ...120 L2TP Tunnel Support ...122 OpenVPN Support ...123 OpenVPN Remote Net work 125 OpenVPN Authentication 126 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

Unified Services Router
User Manual
3
Chapter
4.
Wireless Access Point Setup
........................................................................................................
68
4.1
Wireless Settings Wizard
.................................................................................................
68
4.1.1
Wireless Network Setup Wizard
....................................................................................
69
4.1.2
Add Wireless Device with WPS
.....................................................................................
69
4.1.3
Manual Wireless Network Setup
...................................................................................
70
4.2
Wireless Profiles
..................................................................................................................
70
4.2.1
WEP Security
.......................................................................................................................
71
4.2.2
WPA or WPA2 with PSK
..................................................................................................
73
4.2.3
RADIUS Authentication
....................................................................................................
73
4.3
Creating and Using Access Points
...............................................................................
75
4.3.1
Primary benefits of Virtual APs:
.....................................................................................
77
4.4
Tuning Radio Specific Settings
......................................................................................
78
4.5
WMM
.......................................................................................................................................
79
4.6
Wireless distribution system (WDS)
.............................................................................
80
4.7
Advanced Wireless Settings
...........................................................................................
81
4.8
Wi-Fi Protected Setup (WPS)
.........................................................................................
82
Chapter
5.
Securing the Private Network
.......................................................................................................
85
5.1
Firewall Rules
.......................................................................................................................
85
5.2
Defining Rule Schedules
..................................................................................................
86
5.3
Configuring Firewall Rules
...............................................................................................
87
5.4
Configuring IPv6 Firewall Rules
.....................................................................................
92
5.4.1
Firewall Rule Configuration Examples
.........................................................................
93
5.5
Security on Custom Services
..........................................................................................
97
5.6
ALG support
..........................................................................................................................
99
5.7
VPN Passthrough for Firewall
......................................................................................
100
5.8
Application Rules
..............................................................................................................
101
5.9
Web Content Filtering
......................................................................................................
102
5.9.1
Content Filtering
................................................................................................................
102
5.9.2
Approved URLs
.................................................................................................................
103
5.9.3
Blocked Keywords
............................................................................................................
104
5.9.4
Export Web Filter
..............................................................................................................
105
5.10
IP/MAC Binding
.................................................................................................................
106
5.11
Intrusion Prevention (IPS)
..............................................................................................
107
5.12
Protecting from Internet Attacks
..................................................................................
108
Chapter
6.
IPsec / PPTP / L2TP VPN
............................................................................................................
111
6.1
VPN Wizard
........................................................................................................................
113
6.2
Configuring IPsec Policies
.............................................................................................
115
6.2.1
Extended Authentication (XAUTH)
.............................................................................
119
6.2.2
Internet over IPSec tunnel
.............................................................................................
120
6.3
Configuring VPN clients
..................................................................................................
120
6.4
PPTP / L2TP Tunnels
......................................................................................................
120
6.4.1
PPTP Tunnel Support
.....................................................................................................
120
6.4.2
L2TP Tunnel Support
......................................................................................................
122
6.4.3
OpenVPN Support
............................................................................................................
123
6.4.4
OpenVPN Remote Network
..........................................................................................
125
6.4.5
OpenVPN Authentication
...............................................................................................
126