D-Link DSR-500 User Manual - Page 5

Unified Services Router - remote

Page 5 highlights

Unified Services Router User Manual 4.6 Wi-Fi Protected Setup (WPS 56 Chapter 5. Securing the Private Network 59 5.1 Firewall Rules ...59 5.2 Defining Rule Schedules 60 5.3 Configuring Firewall Rules 61 5.3.1 Firewall Rule Configuration Examples 65 5.4 Security on Custom Services 68 5.5 ALG support...69 5.6 VPN Passthrough for Firewall 70 5.7 Application Rules ...71 5.8 Web Content Filtering 72 5.9 IP/MAC Binding ...75 5.10 Intrusion Prevention (IPS 76 5.10.1 Protecting from Internet Attacks 77 Chapter 6. IPSec / PPTP / L2TP VPN 79 6.1 VPN Wizard ...79 6.2 Configuring IPSec Policies 82 6.2.1 Extended Authentication (XAUTH 85 6.3 Configuring VPN clients 85 6.4 PPTP / L2TP Tunnels 86 6.4.1 PPTP Tunnel Support 86 6.4.2 L2TP Tunnel Support 87 Chapter 7. SSL VPN ...89 7.1 Users, Groups, and Domains 89 7.1.1 User Types and Passwords 90 7.2 Using SSL VPN Policies 92 7.2.1 Using Network Resources 94 7.3 Application Port Forwarding 95 7.4 SSL VPN Client Configuration 96 7.5 User Portal ...98 7.5.1 Creating Portal Layouts 99 Chapter 8. Advanced Configuration Tools 101 8.1 USB Device Setup 101 8.2 Authentication Certificates 101 Chapter 9. Administration & Management 103 9.1 Configuration Access Control 103 9.1.1 Remote Management 103 9.1.2 CLI Access...104 9.2 SNMP Configuration 104 9.3 Configuring Time Zone and NTP 106 9.4 Log Configuration 107 9.4.1 Defining What to Log 107 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

Unified Services Router
User Manual
3
4.6
Wi-Fi Protected Setup (WPS)
...............................................................................
56
Chapter
5.
Securing the Private Network
............................................................................................
59
5.1
Firewall Rules
..........................................................................................................
59
5.2
Defining Rule Schedules
.......................................................................................
60
5.3
Configuring Firewall Rules
.....................................................................................
61
5.3.1
Firewall Rule Configuration Examples
.................................................................
65
5.4
Security on Custom Services
................................................................................
68
5.5
ALG support
.............................................................................................................
69
5.6
VPN Passthrough for Firewall
...............................................................................
70
5.7
Application Rules
....................................................................................................
71
5.8
Web Content Filtering
.............................................................................................
72
5.9
IP/MAC Binding
.......................................................................................................
75
5.10
Intrusion Prevention (IPS)
......................................................................................
76
5.10.1
Protecting from Internet Attacks
...........................................................................
77
Chapter
6.
IPSec / PPTP / L2TP VPN
.................................................................................................
79
6.1
VPN Wizard
.............................................................................................................
79
6.2
Configuring IPSec Policies
....................................................................................
82
6.2.1
Extended Authentication (XAUTH)
.......................................................................
85
6.3
Configuring VPN clients
.........................................................................................
85
6.4
PPTP / L2TP Tunnels
.............................................................................................
86
6.4.1
PPTP Tunnel Support
............................................................................................
86
6.4.2
L2TP Tunnel Support
.............................................................................................
87
Chapter
7.
SSL VPN
...............................................................................................................................
89
7.1
Users, Groups, and Domains
................................................................................
89
7.1.1
User Types and Passwords
..................................................................................
90
7.2
Using SSL VPN Policies
........................................................................................
92
7.2.1
Using Network Resources
.....................................................................................
94
7.3
Application Port Forwarding
..................................................................................
95
7.4
SSL VPN Client Configuration
..............................................................................
96
7.5
User Portal
...............................................................................................................
98
7.5.1
Creating Portal Layouts
.........................................................................................
99
Chapter
8.
Advanced Configuration Tools
.........................................................................................
101
8.1
USB Device Setup
................................................................................................
101
8.2
Authentication Certificates
...................................................................................
101
Chapter
9.
Administration & Management
.........................................................................................
103
9.1
Configuration Access Control
..............................................................................
103
9.1.1
Remote Management
...........................................................................................
103
9.1.2
CLI Access
.............................................................................................................
104
9.2
SNMP Configuration
.............................................................................................
104
9.3
Configuring Time Zone and NTP
........................................................................
106
9.4
Log Configuration
..................................................................................................
107
9.4.1
Defining What to Log
............................................................................................
107