Unified Services Router
User Manual
8
Figure 64: Example of clientless SSL VPN connections to the DSR
................................................
102
Figure 65: List of groups
..........................................................................................................................
103
Figure 66: User group configuration
......................................................................................................
104
Figure 67: SSLVPN Settings
...................................................................................................................
105
Figure 68: Group login policies options
.................................................................................................
106
Figure 69: Browser policies options
.......................................................................................................
107
Figure 70: IP policies options
..................................................................................................................
108
Figure 71: Available Users with login status and associated Group
.................................................
109
Figure 72: User configuration options
....................................................................................................
110
Figure 73: List of SSL VPN polices (Global filter)
................................................................................
111
Figure 74: SSL VPN policy configuration
..............................................................................................
112
Figure 75: List of configured resources, which are available to assign to SSL VPN policies
.......
114
Figure 76: List of Available Applications for SSL Port Forwarding
....................................................
116
Figure 77: SSL VPN client adapter and access configuration
...........................................................
117
Figure 78: Configured client routes only apply in split tunnel mode
.................................................
118
Figure 79: List of configured SSL VPN portals. The configured portal can then be associated with
an authentication domain
......................................................................................................
119
Figure 80: SSL VPN Portal configuration
..............................................................................................
120
Figure 81: USB Device Detection
..........................................................................................................
122
Figure 82: SMS Service
–
Send SMS
...................................................................................................
123
Figure 83: SMS Service
–
Receive SMS
..............................................................................................
124
Figure 84: Certificate summary for IPsec and HTTPS management
................................................
125
Figure 85: Advanced Switch Settings
....................................................................................................
126
Figure 86: User Login policy configuration
...........................................................................................
127
Figure 87: Remote Management from the WAN
.................................................................................
128
Figure 88: SNMP Users, Traps, and Access Control
..........................................................................
129
Figure 89: SNMP system information for this router
...........................................................................
130
Figure 90: Date, Time, and NTP server setup
......................................................................................
131
Figure 91: Facility settings for Logging
..................................................................................................
133
Figure 92: Log configuration options for traffic through router
...........................................................
135
Figure 93: E-mail configuration as a Remote Logging option
............................................................
136
Figure 94: Syslog server configuration for Remote Logging (continued)
.........................................
137
Figure 95: VPN logs displayed in GUI event viewer
............................................................................
138
Figure 96: Restoring configuration from a saved file will result in the current configuration being
overwritten and a reboot
.......................................................................................................
139
Figure 97: Firmware version information and upgrade option
...........................................................
140