Unified Services Router    User Manual 
7  
Figure 33: List of configured access points (Virtual APs) shows one enabled access point on the 
radio, broadcasting its SSID ................................................................................................... 61 
Figure 34: Radio card configuration options ........................................................................................... 62 
Figure 35: Advanced Wireless communication settings ....................................................................... 63 
Figure 36: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 64 
Figure 37: List of Available Firewall Rules .............................................................................................. 66 
Figure 38: List of Available Schedules to bind to a firewall rule .......................................................... 67 
Figure 39: Example where an outbound SNAT rule is used to map an external IP address 
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 70 
Figure 40: The firewall rule configuration page allows you to define the To/From zone, service, 
action, schedules, and specify source/destination IP addresses as needed. ................. 71 
Figure 41: Schedule configuration for the above example. .................................................................. 75 
Figure 42: List of user defined services. ................................................................................................. 77 
Figure 43: Available ALG support on the router..................................................................................... 78 
Figure 44: Passthrough options for VPN tunnels ................................................................................... 79 
Figure 45: List of Available Application Rules showing 4 unique rules .............................................. 80 
Figure 46: Content Filtering used to block access to proxy servers and prevent ActiveX controls 
from being downloaded ........................................................................................................... 81 
Figure 47: Two trusted domains added to the Approved URLs List ................................................... 82 
Figure 48: One keyword added to the block list ..................................................................................... 83 
Figure 49: Export Approved URL list ....................................................................................................... 84 
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by 
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and 
logs will be captured ................................................................................................................ 85 
Figure 51: Intrusion Prevention features on the router ......................................................................... 86 
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 87 
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected 
to the Internet ............................................................................................................................ 88 
Figure 54: Example of three IPsec client connections to the internal network through the DSR 
IPsec gateway .......................................................................................................................... 89 
Figure 55: VPN Wizard launch screen .................................................................................................... 90 
Figure 56: IPsec policy configuration ....................................................................................................... 93 
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 94 
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 95 
Figure 59: PPTP tunnel configuration – PPTP Client ............................................................................ 97 
Figure 60: PPTP VPN connection status ................................................................................................ 97 
Figure 61: PPTP tunnel configuration – PPTP Server .......................................................................... 98 
Figure 62: L2TP tunnel configuration – L2TP Server ............................................................................ 99 
Figure 63: OpenVPN configuration ........................................................................................................ 100