iv
3G/4G connection ······················································································· 128
Displaying 3G/4G connection information ······································································································ 128
Configuring the cellular interface ··················································································································· 131
Managing the PIN ·········································································································································· 132
Rebooting the 3G/4G modem ························································································································ 133
Configuring NAT ························································································· 134
Overview ························································································································································ 134
Recommended configuration procedure ········································································································ 134
Configuring dynamic NAT ······························································································································ 134
Configuring a DMZ host ································································································································· 136
Creating a DMZ host ······························································································································ 136
Enabling DMZ host on an interface ········································································································ 136
Configuring an internal server ························································································································ 137
Enabling application layer protocol check ······································································································ 139
Configuring connection limit ··························································································································· 139
NAT configuration examples ·························································································································· 140
Internal hosts accessing public network configuration example ···························································· 140
Internal server configuration example ···································································································· 141
Configuring access control ·········································································· 145
Configuration procedure ································································································································ 145
Access control configuration example ··········································································································· 146
Configuring URL filtering ············································································· 148
Configuration procedure ································································································································ 148
URL filtering configuration example ··············································································································· 149
Configuring attack protection ······································································ 151
Overview ························································································································································ 151
Blacklist function ···································································································································· 151
Intrusion detection function ···················································································································· 151
Configuring the blacklist function ··················································································································· 153
Recommended configuration procedure ································································································ 153
Enabling the blacklist function ················································································································ 154
Adding a blacklist entry manually ··········································································································· 154
Viewing blacklist entries ························································································································· 155
Configuring intrusion detection ······················································································································ 155
Attack protection configuration examples ······································································································ 157
Attack protection configuration example for MSR900/20-1X ································································· 157
For MSR20/30/36/50/930 routers ··········································································································· 160
Configuring application control ···································································· 164
Recommended configuration procedure ········································································································ 164
Loading applications ······························································································································ 164
Configuring a custom application ··········································································································· 165
Enabling application control ··················································································································· 166
Application control configuration example ····································································································· 167
Configuring webpage redirection ································································ 169
Configuring routes ······················································································· 171
Overview ························································································································································ 171
Creating an IPv4 static route ·························································································································· 171
Displaying the active route table ···················································································································· 172
IPv4 static route configuration example ········································································································· 173
Network requirements ···························································································································· 173
Configuration considerations ·················································································································· 174
Configuration procedure ························································································································· 174
Configuration guidelines ································································································································ 176