Unified Services Router User Manual
6
Figure 33: Virtual AP configuration .......................................................................................................... 58
Figure 34: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 59
Figure 35: Radio card configuration options ........................................................................................... 60
Figure 36: Advanced Wireless communication settings ....................................................................... 61
Figure 37: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 62
Figure 38: List of Available Firewall Rules .............................................................................................. 64
Figure 39: List of Available Schedules to bind to a firewall rule .......................................................... 65
Figure 40: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 68
Figure 41: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ................. 69
Figure 42: Schedule configuration for the above example. .................................................................. 73
Figure 43: List of user defined services. ................................................................................................. 75
Figure 44: Available ALG support on the router..................................................................................... 76
Figure 45: Passthrough options for VPN tunnels ................................................................................... 77
Figure 46: List of Available Application Rules showing 4 unique rules .............................................. 78
Figure 47: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ........................................................................................................... 79
Figure 48: Two trusted domains added to the Approved URLs List ................................................... 80
Figure 49: Two keywords added to the block list ................................................................................... 81
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured ................................................................................................................ 82
Figure 51: Intrusion Prevention features on the router ......................................................................... 83
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 84
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet ............................................................................................................................ 85
Figure 54: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway .......................................................................................................................... 86
Figure 55: VPN Wizard launch screen .................................................................................................... 87
Figure 56: IPsec policy configuration ....................................................................................................... 90
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 91
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 92
Figure 59: PPTP tunnel configuration – PPTP Server .......................................................................... 94
Figure 60: L2TP tunnel configuration – L2TP Server ............................................................................ 94
Figure 61: Example of clientless SSL VPN connections to the DSR .................................................. 96
Figure 62: Available Users with login status and associated Group/Domain .................................... 97
Figure 63: User configuration options .................................................................................................... 100