D-Link DSR-250 Product Manual - Page 5

Unified Services Router - vpn setup

Page 5 highlights

Unified Services Router User Manual 4.3.1 4.4 4.5 4.6 Primary benefits of Virtual APs 61 Tuning Radio Specific Settings 62 Advanced Wireless Settings 63 Wi-Fi Protected Setup (WPS 63 Chapter 5. Securing the Private Network 65 5.1 Firewall Rules ...65 5.2 Defining Rule Schedules 66 5.3 Configuring Firewall Rules 67 5.3.1 Firewall Rule Configuration Examples 72 5.4 Security on Custom Services 76 5.5 ALG support...77 5.6 VPN Passthrough for Firewall 78 5.7 Application Rules ...79 5.8 5.8.1 5.8.2 5.8.3 5.8.4 Web Content Filtering 80 Content Filtering...80 Approved URLs ...81 Blocked Keywords 82 Export Web Filter ...83 5.9 IP/MAC Binding ...84 5.10 Intrusion Prevention (IPS 85 5.11 Protecting from Internet Attacks 86 Chapter 6. IPsec / PPTP / L2TP VPN 88 6.1 VPN Wizard ...90 6.2 Configuring IPsec Policies 92 6.2.1 Extended Authentication (XAUTH 95 6.2.2 Internet over IPSec tunnel 95 6.3 Configuring VPN clients 96 6.4 6.4.1 6.4.2 6.4.3 PPTP / L2TP Tunnels 96 PPTP Tunnel Support 96 L2TP Tunnel Support 98 OpenVPN Support 99 Chapter 7. SSL VPN ...101 7.1 Groups and Users 103 7.1.1 Users and Passwords 109 7.2 Using SSL VPN Policies 110 7.2.1 Using Network Resources 113 7.3 Application Port Forwarding 114 7.4 SSL VPN Client Configuration 116 7.5 User Portal ...118 7.5.1 Creating Portal Layouts 119 Chapter 8. Advanced Configuration Tools 121 8.1 USB Device Setup 121 8.2 SMS service...122 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233

Unified Services Router
User Manual
3
4.3.1
Primary benefits of Virtual APs:
............................................................................
61
4.4
Tuning Radio Specific Settings
.............................................................................
62
4.5
Advanced Wireless Settings
..................................................................................
63
4.6
Wi-Fi Protected Setup (WPS)
...............................................................................
63
Chapter
5.
Securing the Private Network
............................................................................................
65
5.1
Firewall Rules
..........................................................................................................
65
5.2
Defining Rule Schedules
.......................................................................................
66
5.3
Configuring Firewall Rules
.....................................................................................
67
5.3.1
Firewall Rule Configuration Examples
.................................................................
72
5.4
Security on Custom Services
................................................................................
76
5.5
ALG support
.............................................................................................................
77
5.6
VPN Passthrough for Firewall
...............................................................................
78
5.7
Application Rules
....................................................................................................
79
5.8
Web Content Filtering
.............................................................................................
80
5.8.1
Content Filtering
......................................................................................................
80
5.8.2
Approved URLs
.......................................................................................................
81
5.8.3
Blocked Keywords
..................................................................................................
82
5.8.4
Export Web Filter
....................................................................................................
83
5.9
IP/MAC Binding
.......................................................................................................
84
5.10
Intrusion Prevention (IPS)
......................................................................................
85
5.11
Protecting from Internet Attacks
...........................................................................
86
Chapter
6.
IPsec / PPTP / L2TP VPN
..................................................................................................
88
6.1
VPN Wizard
.............................................................................................................
90
6.2
Configuring IPsec Policies
.....................................................................................
92
6.2.1
Extended Authentication (XAUTH)
.......................................................................
95
6.2.2
Internet over IPSec tunnel
.....................................................................................
95
6.3
Configuring VPN clients
.........................................................................................
96
6.4
PPTP / L2TP Tunnels
.............................................................................................
96
6.4.1
PPTP Tunnel Support
............................................................................................
96
6.4.2
L2TP Tunnel Support
.............................................................................................
98
6.4.3
OpenVPN Support
..................................................................................................
99
Chapter
7.
SSL VPN
.............................................................................................................................
101
7.1
Groups and Users
.................................................................................................
103
7.1.1
Users and Passwords
..........................................................................................
109
7.2
Using SSL VPN Policies
......................................................................................
110
7.2.1
Using Network Resources
...................................................................................
113
7.3
Application Port Forwarding
................................................................................
114
7.4
SSL VPN Client Configuration
............................................................................
116
7.5
User Portal
.............................................................................................................
118
7.5.1
Creating Portal Layouts
.......................................................................................
119
Chapter
8.
Advanced Configuration Tools
.........................................................................................
121
8.1
USB Device Setup
................................................................................................
121
8.2
SMS service
...........................................................................................................
122