EasyManua.ls Logo

D-Link DSR-250 - Page 9

D-Link DSR-250
233 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Unified Services Router User Manual
7
Figure 33: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 61
Figure 34: Radio card configuration options ........................................................................................... 62
Figure 35: Advanced Wireless communication settings ....................................................................... 63
Figure 36: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 64
Figure 37: List of Available Firewall Rules .............................................................................................. 66
Figure 38: List of Available Schedules to bind to a firewall rule .......................................................... 67
Figure 39: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 70
Figure 40: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ................. 71
Figure 41: Schedule configuration for the above example. .................................................................. 75
Figure 42: List of user defined services. ................................................................................................. 77
Figure 43: Available ALG support on the router..................................................................................... 78
Figure 44: Passthrough options for VPN tunnels ................................................................................... 79
Figure 45: List of Available Application Rules showing 4 unique rules .............................................. 80
Figure 46: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ........................................................................................................... 81
Figure 47: Two trusted domains added to the Approved URLs List ................................................... 82
Figure 48: One keyword added to the block list ..................................................................................... 83
Figure 49: Export Approved URL list ....................................................................................................... 84
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured ................................................................................................................ 85
Figure 51: Intrusion Prevention features on the router ......................................................................... 86
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 87
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet ............................................................................................................................ 88
Figure 54: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway .......................................................................................................................... 89
Figure 55: VPN Wizard launch screen .................................................................................................... 90
Figure 56: IPsec policy configuration ....................................................................................................... 93
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 94
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 95
Figure 59: PPTP tunnel configuration PPTP Client ............................................................................ 97
Figure 60: PPTP VPN connection status ................................................................................................ 97
Figure 61: PPTP tunnel configuration PPTP Server .......................................................................... 98
Figure 62: L2TP tunnel configuration L2TP Server ............................................................................ 99
Figure 63: OpenVPN configuration ........................................................................................................ 100

Table of Contents

Other manuals for D-Link DSR-250

Related product manuals