EasyManua.ls Logo

D-Link NetDefend DFL-210

D-Link NetDefend DFL-210
495 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
7.4.4. Port Translation ......................................................................... 313
7.4.5. Protocols Handled by SAT .......................................................... 313
7.4.6. Multiple SAT Rule Matches ......................................................... 313
7.4.7. SAT and FwdFast Rules .............................................................. 314
8. User Authentication ........................................................................................ 317
8.1. Overview ............................................................................................ 317
8.2. Authentication Setup ............................................................................. 319
8.2.1. Setup Summary ......................................................................... 319
8.2.2. The Local Database .................................................................... 319
8.2.3. External RADIUS Servers ........................................................... 319
8.2.4. External LDAP Servers ............................................................... 320
8.2.5. Authentication Rules ..................................................................326
8.2.6. Authentication Processing ........................................................... 328
8.2.7. HTTP Authentication ................................................................. 328
8.3. Customizing HTML Pages ..................................................................... 333
9. VPN ............................................................................................................. 337
9.1. Overview ............................................................................................ 337
9.1.1. VPN Usage ............................................................................... 337
9.1.2. VPN Encryption ........................................................................ 338
9.1.3. VPN Planning ........................................................................... 338
9.1.4. Key Distribution ........................................................................ 339
9.1.5. The TLS Alternative for VPN ......................................................339
9.2. VPN Quick Start .................................................................................. 341
9.2.1. IPsec LAN to LAN with Pre-shared Keys ....................................... 342
9.2.2. IPsec LAN to LAN with Certificates ............................................. 343
9.2.3. IPsec Roaming Clients with Pre-shared Keys ..................................344
9.2.4. IPsec Roaming Clients with Certificates .........................................346
9.2.5. L2TP Roaming Clients with Pre-Shared Keys ................................. 347
9.2.6. L2TP Roaming Clients with Certificates ........................................348
9.2.7. PPTP Roaming Clients ............................................................... 349
9.3. IPsec Components ................................................................................ 351
9.3.1. Overview ................................................................................. 351
9.3.2. Internet Key Exchange (IKE) ....................................................... 351
9.3.3. IKE Authentication .................................................................... 357
9.3.4. IPsec Protocols (ESP/AH) ........................................................... 358
9.3.5. NAT Traversal .......................................................................... 359
9.3.6. Algorithm Proposal Lists ............................................................. 360
9.3.7. Pre-shared Keys ........................................................................ 362
9.3.8. Identification Lists .....................................................................363
9.4. IPsec Tunnels ...................................................................................... 365
9.4.1. Overview ................................................................................. 365
9.4.2. LAN to LAN Tunnels with Pre-shared Keys ................................... 366
9.4.3. Roaming Clients ........................................................................ 366
9.4.4. Fetching CRLs from an alternate LDAP server ................................ 371
9.4.5. Troubleshooting with ikesnoop ..................................................... 372
9.4.6. IPsec Advanced Settings ............................................................. 379
9.5. PPTP/L2TP ......................................................................................... 383
9.5.1. PPTP Servers ............................................................................ 383
9.5.2. L2TP Servers ............................................................................ 384
9.5.3. L2TP/PPTP Server advanced settings ............................................388
9.5.4. PPTP/L2TP Clients .................................................................... 389
9.6. CA Server Access ................................................................................ 392
9.7. VPN Troubleshooting ...........................................................................395
9.7.1. General Troubleshooting ............................................................. 395
9.7.2. Troubleshooting Certificates ........................................................395
9.7.3. IPsec Troubleshooting Commands ................................................396
9.7.4. Management Interface Failure with VPN ........................................ 397
9.7.5. Specific Error Messages ..............................................................397
9.7.6. Specific Symptoms .................................................................... 399
10. Traffic Management ...................................................................................... 402
10.1. Traffic Shaping .................................................................................. 402
10.1.1. Overview ................................................................................402
10.1.2. Traffic Shaping in NetDefendOS ................................................. 403
User Manual
7

Table of Contents

Other manuals for D-Link NetDefend DFL-210

Related product manuals