Unified Services Router User Manual
3
3.8 WAN Port Settings .................................................................................................. 65
Chapter 4. Wireless Access Point Setup ............................................................................................. 67
4.1 Wireless Settings Wizard ....................................................................................... 67
4.1.1 Wireless Network Setup Wizard ........................................................................... 68
4.1.2 Add Wireless Device with WPS ............................................................................ 68
4.1.3 Manual Wireless Network Setup .......................................................................... 69
4.2 Wireless Profiles ..................................................................................................... 69
4.2.1 WEP Security .......................................................................................................... 70
4.2.2 WPA or WPA2 with PSK ........................................................................................ 71
4.3 Creating and Using Access Points ....................................................................... 71
4.3.1 Primary benefits of Virtual APs: ............................................................................ 73
4.4 Tuning Radio Specific Settings ............................................................................. 74
4.5 WMM ......................................................................................................................... 74
4.6 Wireless distribution system (WDS) ..................................................................... 75
4.7 Advanced Wireless Settings.................................................................................. 77
4.8 Wi-Fi Protected Setup (WPS) ............................................................................... 78
Chapter 5. Securing the Private Network ............................................................................................ 81
5.1 Firewall Rules .......................................................................................................... 81
5.2 Defining Rule Schedules ....................................................................................... 82
5.3 Configuring Firewall Rules ..................................................................................... 83
5.4 Configuring IPv6 Firewall Rules ............................................................................ 88
5.4.1 Firewall Rule Configuration Examples ................................................................. 90
5.5 Security on Custom Services ................................................................................ 94
5.6 ALG support ............................................................................................................. 97
5.7 VPN Passthrough for Firewall ............................................................................... 98
5.8 Application Rules .................................................................................................... 99
5.9 Web Content Filtering ........................................................................................... 100
5.9.1 Content Filtering .................................................................................................... 100
5.9.2 Approved URLs ..................................................................................................... 101
5.9.3 Blocked Keywords ................................................................................................ 102
5.9.4 Export Web Filter .................................................................................................. 103
5.10 IP/MAC Binding ..................................................................................................... 104
5.11 Intrusion Prevention (IPS).................................................................................... 105
5.12 Protecting from Internet Attacks ......................................................................... 106
5.13 IGMP Proxy to manage multicast traffic ............................................................ 108
Chapter 6. IPsec / PPTP / L2TP VPN ................................................................................................ 110
6.1 VPN Wizard ........................................................................................................... 112
6.2 Configuring IPsec Policies ................................................................................... 114
6.2.1 Extended Authentication (XAUTH) ..................................................................... 118
6.2.2 Internet over IPsec tunnel .................................................................................... 119
6.3 Configuring VPN clients ....................................................................................... 119
6.4 PPTP / L2TP Tunnels ........................................................................................... 119
6.4.1 PPTP Tunnel Support .......................................................................................... 119
6.4.2 L2TP Tunnel Support ........................................................................................... 121