EasyManua.ls Logo

D-Link DSR-500 - Page 8

D-Link DSR-500
213 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Unified Services Router User Manual
6
Figure 33: Virtual AP configuration .......................................................................................................... 58
Figure 34: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 59
Figure 35: Radio card configuration options ........................................................................................... 60
Figure 36: Advanced Wireless communication settings ....................................................................... 61
Figure 37: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 62
Figure 38: List of Available Firewall Rules .............................................................................................. 64
Figure 39: List of Available Schedules to bind to a firewall rule .......................................................... 65
Figure 40: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 68
Figure 41: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ................. 69
Figure 42: Schedule configuration for the above example. .................................................................. 73
Figure 43: List of user defined services. ................................................................................................. 75
Figure 44: Available ALG support on the router..................................................................................... 76
Figure 45: Passthrough options for VPN tunnels ................................................................................... 77
Figure 46: List of Available Application Rules showing 4 unique rules .............................................. 78
Figure 47: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ........................................................................................................... 79
Figure 48: Two trusted domains added to the Approved URLs List ................................................... 80
Figure 49: Two keywords added to the block list ................................................................................... 81
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured ................................................................................................................ 82
Figure 51: Intrusion Prevention features on the router ......................................................................... 83
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 84
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet ............................................................................................................................ 85
Figure 54: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway .......................................................................................................................... 86
Figure 55: VPN Wizard launch screen .................................................................................................... 87
Figure 56: IPsec policy configuration ....................................................................................................... 90
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 91
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 92
Figure 59: PPTP tunnel configuration PPTP Server .......................................................................... 94
Figure 60: L2TP tunnel configuration L2TP Server ............................................................................ 94
Figure 61: Example of clientless SSL VPN connections to the DSR .................................................. 96
Figure 62: Available Users with login status and associated Group/Domain .................................... 97
Figure 63: User configuration options .................................................................................................... 100

Table of Contents

Other manuals for D-Link DSR-500

Related product manuals