Unified Services Router    User Manual 
6  
Figure 33: Virtual AP configuration .......................................................................................................... 58 
Figure 34: List of configured access points (Virtual APs) shows one enabled access point on the 
radio, broadcasting its SSID ................................................................................................... 59 
Figure 35: Radio card configuration options ........................................................................................... 60 
Figure 36: Advanced Wireless communication settings ....................................................................... 61 
Figure 37: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 62 
Figure 38: List of Available Firewall Rules .............................................................................................. 64 
Figure 39: List of Available Schedules to bind to a firewall rule .......................................................... 65 
Figure 40: Example where an outbound SNAT rule is used to map an external IP address 
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 68 
Figure 41: The firewall rule configuration page allows you to define the To/From zone, service, 
action, schedules, and specify source/destination IP addresses as needed. ................. 69 
Figure 42: Schedule configuration for the above example. .................................................................. 73 
Figure 43: List of user defined services. ................................................................................................. 75 
Figure 44: Available ALG support on the router..................................................................................... 76 
Figure 45: Passthrough options for VPN tunnels ................................................................................... 77 
Figure 46: List of Available Application Rules showing 4 unique rules .............................................. 78 
Figure 47: Content Filtering used to block access to proxy servers and prevent ActiveX controls 
from being downloaded ........................................................................................................... 79 
Figure 48: Two trusted domains added to the Approved URLs List ................................................... 80 
Figure 49: Two keywords added to the block list ................................................................................... 81 
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by 
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and 
logs will be captured ................................................................................................................ 82 
Figure 51: Intrusion Prevention features on the router ......................................................................... 83 
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 84 
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected 
to the Internet ............................................................................................................................ 85 
Figure 54: Example of three IPsec client connections to the internal network through the DSR 
IPsec gateway .......................................................................................................................... 86 
Figure 55: VPN Wizard launch screen .................................................................................................... 87 
Figure 56: IPsec policy configuration ....................................................................................................... 90 
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 91 
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 92 
Figure 59: PPTP tunnel configuration – PPTP Server .......................................................................... 94 
Figure 60: L2TP tunnel configuration – L2TP Server ............................................................................ 94 
Figure 61: Example of clientless SSL VPN connections to the DSR .................................................. 96 
Figure 62: Available Users with login status and associated Group/Domain .................................... 97 
Figure 63: User configuration options .................................................................................................... 100