Unified Services Router
User Manual
6
Figure 32: Radio card configuration options
........................................................................................... 55
Figure 33: Advanced Wireless communication settings
....................................................................... 56
Figure 34: WPS configuration for an AP with WPA/WPA2 profile
....................................................... 57
Figure 35: List of Available Firewall Rules
.............................................................................................. 60
Figure 36: List of Available Schedules to bind to a firewall rule
.......................................................... 61
Figure 37: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed.
................. 64
Figure 38: Schedule configuration for the above example.
.................................................................. 67
Figure 39: List of user defined services.
................................................................................................. 69
Figure 40: Available ALG support on the router.
.................................................................................... 70
Figure 41: Passthrough options for VPN tunnels
................................................................................... 71
Figure 42: List of Available Application Rules showing 4 unique rules
.............................................. 72
Figure 43: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded
........................................................................................................... 73
Figure 44: Two trusted domains added to the Approved URLs List
................................................... 74
Figure 45: Two keywords added to the block list
................................................................................... 75
Figure 46: The above example of IP/MAC Binding binds a LAN host’s MAC Address to an IP
address. If there is an IP/MAC Binding violation, the violating packet will be dropped
and logs will be captured
........................................................................................................ 76
Figure 47: Intrusion Prevention features on the router
......................................................................... 77
Figure 48: Protecting the router and LAN from internet attacks
.......................................................... 78
Figure 49: VPN Wizard launch screen
.................................................................................................... 80
Figure 50: IPSec policy configuration
...................................................................................................... 83
Figure 51: IPSec policy configuration continued (Auto policy via IKE)
............................................... 84
Figure 52: IPSec policy configuration continued (Auto / Manual Phase 2)
........................................ 85
Figure 53: PPTP tunnel configuration – PPTP Server
.......................................................................... 87
Figure 54: L2TP tunnel configuration – L2TP Server
............................................................................ 87
Figure 55: Available Users with login status and associated Group/Domain
.................................... 90
Figure 56: User configuration options
...................................................................................................... 92
Figure 57: List of SSL VPN polices (Global filter)
.................................................................................. 93
Figure 58: SSL VPN policy configuration
................................................................................................ 94
Figure 59: List of configured resources, which are available to assign to SSL VPN policies
......... 95
Figure 60: List of Available Applications for SSL Port Forwarding
...................................................... 96
Figure 61: SSL VPN client adapter and access configuration
............................................................. 97
Figure 62: Configured client routes only apply in split tunnel mode
.................................................... 98
Figure 63: List of configured SSL VPN portals. The configured portal can then be associated with
an authentication domain
........................................................................................................ 99
Содержание DSR-1000N
Страница 2: ...User Manual Unified Services Router D Link Corporation Copyright 2010 http www dlink com ...
Страница 28: ...Unified Services Router User Manual 26 Figure 11 Manual WAN configuration ...
Страница 60: ......
Страница 80: ...Unified Services Router User Manual 78 Figure 48 Protecting the router and LAN from internet attacks ...
Страница 90: ......
Страница 102: ...Unified Services Router User Manual 100 Figure 64 SSL VPN Portal configuration ...
Страница 123: ...Unified Services Router User Manual 121 Figure 82 Device Status display ...
Страница 125: ...Unified Services Router User Manual 123 Figure 84 Resource Utilization statistics ...
Страница 126: ...Unified Services Router User Manual 124 ...
Страница 127: ...Unified Services Router User Manual 125 Figure 85 Resource Utilization data continued ...
Страница 131: ...Unified Services Router User Manual 129 Figure 89 List of current Active Firewall Sessions ...
Страница 140: ......
Страница 144: ......