D-Link DFL-500 User Manual page 6

Hide thumbs Also See for DFL-500:
Table of Contents

Advertisement

Configuring a Windows 2000 Client for PPTP.......................................................................................... 78
Configuring a Windows XP Client for PPTP ............................................................................................. 78
PPTP pass through....................................................................................................................................... 79
PPTP client to network pass through ....................................................................................................... 80
L2TP VPN configuration ............................................................................................................................... 81
Configuring the DFL-500 as an L2TP gateway ........................................................................................ 81
Configuring a Windows 2000 Client for L2TP........................................................................................... 82
Configuring a Windows XP Client for L2TP.............................................................................................. 83
RADIUS authentication for PPTP and L2TP VPNs ...................................................................................... 85
Adding RADIUS server addresses ........................................................................................................... 85
Turning on RADIUS authentication for PPTP........................................................................................... 86
Turning on RADIUS authentication for L2TP............................................................................................ 86
Network Intrusion detection system (NIDS) .............................................. 87
NIDS features................................................................................................................................................ 87
Denial of Service (DoS) attacks................................................................................................................ 87
Reconnaissance ....................................................................................................................................... 87
Exploits ..................................................................................................................................................... 88
NIDS evasion ............................................................................................................................................ 88
Configuring NIDS detection .......................................................................................................................... 88
Viewing the attack list ................................................................................................................................... 89
Configuring NIDS responses ........................................................................................................................ 89
General NIDS responses.......................................................................................................................... 89
NIDS Alerts ............................................................................................................................................... 89
Virus protection .......................................................................................... 91
Configuring antivirus protection .................................................................................................................... 91
Antivirus connection types ........................................................................................................................ 92
Configuring antivirus protection ................................................................................................................ 92
Worm protection............................................................................................................................................ 93
Customize antivirus messages ..................................................................................................................... 94
Customizing messages added to email .................................................................................................... 94
Customizing messages added to web pages ........................................................................................... 94
Updating your antivirus database ................................................................................................................. 95
Displaying virus and worm lists..................................................................................................................... 95
Web content filtering .................................................................................. 96
Block web pages that contain unwanted content.......................................................................................... 96
Enabling the banned word list................................................................................................................... 96
Changing the content block message ...................................................................................................... 96
Adding words and phrases to the banned word list.................................................................................. 96
Temporarily disabling the banned word list .............................................................................................. 97
Temporarily disabling individual words in the banned word list................................................................ 97
Clearing the banned word list ................................................................................................................... 98
Backing up the banned word list............................................................................................................... 98
DFL-500 User Manual
6

Advertisement

Table of Contents
loading

Table of Contents