D-Link DSR-500 User Manual - Page 8
The above example of IP/MAC Binding binds a LAN host's MAC Address to an IP - port forwarding
View all D-Link DSR-500 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
Unified Services Router User Manual Figure 32: Radio card configuration options 55 Figure 33: Advanced Wireless communication settings 56 Figure 34: WPS configuration for an AP with WPA/WPA2 profile 57 Figure 35: List of Available Firewall Rules 60 Figure 36: List of Available Schedules to bind to a firewall rule 61 Figure 37: The firewall rule configuration page allows you to define the To/From zone, service, action, schedules, and specify source/destination IP addresses as needed 64 Figure 38: Schedule configuration for the above example 67 Figure 39: List of user defined services 69 Figure 40: Available ALG support on the router 70 Figure 41: Passthrough options for VPN tunnels 71 Figure 42: List of Available Application Rules showing 4 unique rules 72 Figure 43: Content Filtering used to block access to proxy servers and prevent ActiveX controls from being downloaded...73 Figure 44: Two trusted domains added to the Approved URLs List 74 Figure 45: Two keywords added to the block list 75 Figure 46: The above example of IP/MAC Binding binds a LAN host's MAC Address to an IP address. If there is an IP/MAC Binding violation, the violating packet will be dropped and logs will be captured ...76 Figure 47: Intrusion Prevention features on the router 77 Figure 48: Protecting the router and LAN from internet attacks 78 Figure 49: VPN Wizard launch screen ...80 Figure 50: IPSec policy configuration ...83 Figure 51: IPSec policy configuration continued (Auto policy via IKE 84 Figure 52: IPSec policy configuration continued (Auto / Manual Phase 2 85 Figure 53: PPTP tunnel configuration - PPTP Server 87 Figure 54: L2TP tunnel configuration - L2TP Server 87 Figure 55: Available Users with login status and associated Group/Domain 90 Figure 56: User configuration options...92 Figure 57: List of SSL VPN polices (Global filter 93 Figure 58: SSL VPN policy configuration 94 Figure 59: List of configured resources, which are available to assign to SSL VPN policies .........95 Figure 60: List of Available Applications for SSL Port Forwarding 96 Figure 61: SSL VPN client adapter and access configuration 97 Figure 62: Configured client routes only apply in split tunnel mode 98 Figure 63: List of configured SSL VPN portals. The configured portal can then be associated with an authentication domain...99 6