Table of Contents
SBG3500-N Series User’s Guide
11
Chapter 18
MAC Filter..........................................................................................................................................261
18.1 Overview ......................................................................................................................................261
18.2 The MAC Filter Screen ..................................................................................................................262
Chapter 19
User Access Control ........................................................................................................................264
19.1 Overview .......................................................................................................................................264
19.2 The User Access Control Screen ..................................................................................................264
19.2.1 Add/Edit a User Access Control Rule ..................................................................................265
Chapter 20
Scheduler Rules................................................................................................................................267
20.1 Overview .......................................................................................................................................267
20.2 The Scheduler Rules Screen ........................................................................................................267
20.2.1 Add/Edit a Schedule ............................................................................................................267
Chapter 21
Certificates ........................................................................................................................................269
21.1 Overview .......................................................................................................................................269
21.1.1 What You Can Do in this Chapter ........................................................................................269
21.2 What You Need to Know ...............................................................................................................269
21.3 The Local Certificates Screen .......................................................................................................269
21.3.1 Create Certificate Request .................................................................................................270
21.3.2 Load Signed Certificate ......................................................................................................272
21.4 The Trusted CA Screen ................................................................................................................273
21.4.1 Import Trusted CA Certificate ..............................................................................................273
Chapter 22
IPSec VPN..........................................................................................................................................275
22.1 Overview .......................................................................................................................................275
22.2 What You Can Do in this Chapter .................................................................................................275
22.3 What You Need To Know ..............................................................................................................276
22.4 The Setup Screen .........................................................................................................................276
22.4.1 Add/Edit VPN Rule ..............................................................................................................277
22.4.2 The VPN Connection Add/Edit Screen ................................................................................277
22.4.3 The Default_L2TPVPN IPSec VPN Rule .............................................................................285
22.5 The IPSec VPN Monitor Screen ....................................................................................................285
22.6 The Radius Screen .......................................................................................................................286
22.7 Technical Reference ......................................................................................................................287
22.7.1 IPSec Architecture ...............................................................................................................287
22.7.2 Encapsulation ......................................................................................................................288
22.7.3 IKE Phases .........................................................................................................................289