Unified Services Router
User Manual
3
4.6
Wi-Fi Protected Setup (WPS)
...............................................................................
56
Chapter
5.
Securing the Private Network
............................................................................................
59
5.1
Firewall Rules
..........................................................................................................
59
5.2
Defining Rule Schedules
.......................................................................................
60
5.3
Configuring Firewall Rules
.....................................................................................
61
5.3.1
Firewall Rule Configuration Examples
.................................................................
65
5.4
Security on Custom Services
................................................................................
68
5.5
ALG support
.............................................................................................................
69
5.6
VPN Passthrough for Firewall
...............................................................................
70
5.7
Application Rules
....................................................................................................
71
5.8
Web Content Filtering
.............................................................................................
72
5.9
IP/MAC Binding
.......................................................................................................
75
5.10
Intrusion Prevention (IPS)
......................................................................................
76
5.10.1
Protecting from Internet Attacks
...........................................................................
77
Chapter
6.
IPSec / PPTP / L2TP VPN
.................................................................................................
79
6.1
VPN Wizard
.............................................................................................................
79
6.2
Configuring IPSec Policies
....................................................................................
82
6.2.1
Extended Authentication (XAUTH)
.......................................................................
85
6.3
Configuring VPN clients
.........................................................................................
85
6.4
PPTP / L2TP Tunnels
.............................................................................................
86
6.4.1
PPTP Tunnel Support
............................................................................................
86
6.4.2
L2TP Tunnel Support
.............................................................................................
87
Chapter
7.
SSL VPN
...............................................................................................................................
89
7.1
Users, Groups, and Domains
................................................................................
89
7.1.1
User Types and Passwords
..................................................................................
90
7.2
Using SSL VPN Policies
........................................................................................
92
7.2.1
Using Network Resources
.....................................................................................
94
7.3
Application Port Forwarding
..................................................................................
95
7.4
SSL VPN Client Configuration
..............................................................................
96
7.5
User Portal
...............................................................................................................
98
7.5.1
Creating Portal Layouts
.........................................................................................
99
Chapter
8.
Advanced Configuration Tools
.........................................................................................
101
8.1
USB Device Setup
................................................................................................
101
8.2
Authentication Certificates
...................................................................................
101
Chapter
9.
Administration & Management
.........................................................................................
103
9.1
Configuration Access Control
..............................................................................
103
9.1.1
Remote Management
...........................................................................................
103
9.1.2
CLI Access
.............................................................................................................
104
9.2
SNMP Configuration
.............................................................................................
104
9.3
Configuring Time Zone and NTP
........................................................................
106
9.4
Log Configuration
..................................................................................................
107
9.4.1
Defining What to Log
............................................................................................
107