Dell PowerConnect W-IAP92 Dell Instant 6.1.3.1-3.0.0.0 User Guide - Page 8

Controller Configuration for VPN, Policy Enforcement Firewall

Page 8 highlights

Chapter 23 Chapter 24 Chapter 25 Chapter 26 Appendix A Appendix B Policy Enforcement Firewall 191 Authentication Servers...191 Users for Internal Server...192 Roles ...192 Client Blacklisting...193 Types of Client Blacklisting...194 Manual Blacklisting ...194 Adding a Client to the Manual Blacklist 194 Dynamic Blacklisting ...194 Authentication Failure Blacklisting 194 Session Firewall Based Blacklisting 195 PEF Settings...195 Firewall ALG Configuration 195 Firewall-based Logging ...196 VPN Configuration...197 VPN Configuration...197 Routing Profile Configuration 198 DHCP Server Configuration 198 NAT DHCP Configuration 199 Distributed L2 DHCP Configuration 200 Distributed L3 DHCP Configuration 201 Centralized L2 DHCP Configuration 202 User Database ...203 Adding a User...203 Editing User Settings...204 Deleting a User ...204 Regulatory Domain...205 Country Codes List...206 Controller Configuration for VPN 209 Whitelist DB Configuration if the Controller is acting as the Whitelist Entry 209 VPN Local Pool Configuration 210 IAP VPN Profile Configuration 210 Abbreviations ...213 Abbreviations ...213 8 | Contents Dell PowerConnect W-Series Instant Access Point 6.1.3.1-3.0.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

8
|
Contents
Dell PowerConnect W-Series Instant Access Point 6.1.3.1-3.0.0.0
| User Guide
Chapter 23
Policy Enforcement Firewall
..........................................................................................
191
Authentication Servers
..................................................................................................................
191
Users for Internal Server
...............................................................................................................
192
Roles
.................................................................................................................................................
192
Client Blacklisting
...........................................................................................................................
193
Types of Client Blacklisting
...........................................................................................................
194
Manual Blacklisting
...............................................................................................................
194
Adding a Client to the Manual Blacklist
.....................................................................
194
Dynamic Blacklisting
.............................................................................................................
194
Authentication Failure Blacklisting
.............................................................................
194
Session Firewall Based Blacklisting
...........................................................................
195
PEF Settings
.....................................................................................................................................
195
Firewall ALG Configuration
...................................................................................................
195
Firewall-based Logging
.........................................................................................................
196
Chapter 24
VPN Configuration
...........................................................................................................
197
VPN Configuration
..........................................................................................................................
197
Routing Profile Configuration
...............................................................................................
198
DHCP Server Configuration
..................................................................................................
198
NAT DHCP Configuration
..............................................................................................
199
Distributed L2 DHCP Configuration
.............................................................................
200
Distributed L3 DHCP Configuration
.............................................................................
201
Centralized L2 DHCP Configuration
.............................................................................
202
Chapter 25
User Database
.................................................................................................................
203
Adding a User
..................................................................................................................................
203
Editing User Settings
..............................................................................................................
204
Deleting a User
.......................................................................................................................
204
Chapter 26
Regulatory Domain
..........................................................................................................
205
Country Codes List
..........................................................................................................................
206
Appendix A
Controller Configuration for VPN
..................................................................................
209
Whitelist DB Configuration if the Controller is acting as the Whitelist Entry
...............
209
VPN Local Pool Configuration
..............................................................................................
210
IAP VPN Profile Configuration
..............................................................................................
210
Appendix B
Abbreviations
...................................................................................................................
213
Abbreviations
..................................................................................................................................
213