D-Link DFL-500 User Manual page 4

Soho firewall
Hide thumbs Also See for DFL-500:
Table of Contents

Advertisement

Adding policies.......................................................................................................................................... 24
Editing policies .......................................................................................................................................... 26
Policy matching......................................................................................................................................... 26
Arranging policies in the policy list............................................................................................................ 26
Controlling connections from the Internet ..................................................................................................... 26
Accepting incoming connections in NAT mode ........................................................................................ 27
Accepting incoming connections in Transparent mode ............................................................................ 27
Denying incoming connections ................................................................................................................. 27
Controlling connections to the Internet ......................................................................................................... 28
Denying connections to the Internet from the internal network ................................................................ 28
Accepting connections to the Internet from the internal network.............................................................. 29
Requiring authentication to connect to the Internet .................................................................................. 30
Addresses ..................................................................................................................................................... 31
Adding addresses ..................................................................................................................................... 31
Editing addresses ..................................................................................................................................... 32
Services ........................................................................................................................................................ 32
Pre-defined services ................................................................................................................................. 32
Providing access to custom services........................................................................................................ 33
Grouping services..................................................................................................................................... 34
Schedules ..................................................................................................................................................... 35
Creating one-time schedules .................................................................................................................... 35
Creating recurring schedules.................................................................................................................... 36
Applying a schedule to a policy ................................................................................................................ 37
Users and authentication .............................................................................................................................. 37
Adding user names and passwords ......................................................................................................... 38
Setting authentication time out ................................................................................................................. 38
Adding authentication to a policy .............................................................................................................. 38
Virtual IPs...................................................................................................................................................... 39
Adding Virtual IPs ..................................................................................................................................... 39
IP/MAC binding ............................................................................................................................................. 40
Adding IP/MAC binding addresses........................................................................................................... 40
Enabling IP/MAC binding.......................................................................................................................... 40
Traffic shaping .............................................................................................................................................. 41
Adding traffic shaping to a policy .............................................................................................................. 41
IPSec VPNs ................................................................................................... 42
Compatibility with third-party VPN products ................................................................................................. 42
Autokey IPSec VPN between two networks ................................................................................................. 43
Creating the VPN tunnel ........................................................................................................................... 44
Adding internal and external addresses ................................................................................................... 45
Adding an IPSec VPN policy .................................................................................................................... 46
Autokey IPSec VPN for remote clients ......................................................................................................... 47
Configuring the VPN tunnel for the client VPN ......................................................................................... 48
Adding internal and external addresses ................................................................................................... 49
DFL-500 User's Manual
4

Advertisement

Table of Contents
loading

Table of Contents