D-Link NetDefend DFL-210 User Manual page 7

Network security firewall ver 2.26.01
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

7.4.4. Port Translation ......................................................................... 313
7.4.5. Protocols Handled by SAT .......................................................... 313
7.4.6. Multiple SAT Rule Matches ......................................................... 313
7.4.7. SAT and FwdFast Rules .............................................................. 314
8. User Authentication ........................................................................................ 317
8.1. Overview ............................................................................................ 317
8.2. Authentication Setup ............................................................................. 319
8.2.1. Setup Summary ......................................................................... 319
8.2.2. The Local Database .................................................................... 319
8.2.3. External RADIUS Servers ........................................................... 319
8.2.4. External LDAP Servers ............................................................... 320
8.2.5. Authentication Rules .................................................................. 326
8.2.6. Authentication Processing ........................................................... 328
8.2.7. HTTP Authentication ................................................................. 328
8.3. Customizing HTML Pages ..................................................................... 333
9. VPN ............................................................................................................. 337
9.1. Overview ............................................................................................ 337
9.1.1. VPN Usage ............................................................................... 337
9.1.2. VPN Encryption ........................................................................ 338
9.1.3. VPN Planning ........................................................................... 338
9.1.4. Key Distribution ........................................................................ 339
9.1.5. The TLS Alternative for VPN ...................................................... 339
9.2. VPN Quick Start .................................................................................. 341
9.2.1. IPsec LAN to LAN with Pre-shared Keys ....................................... 342
9.2.2. IPsec LAN to LAN with Certificates ............................................. 343
9.2.3. IPsec Roaming Clients with Pre-shared Keys .................................. 344
9.2.4. IPsec Roaming Clients with Certificates ......................................... 346
9.2.5. L2TP Roaming Clients with Pre-Shared Keys ................................. 347
9.2.6. L2TP Roaming Clients with Certificates ........................................ 348
9.2.7. PPTP Roaming Clients ............................................................... 349
9.3. IPsec Components ................................................................................ 351
9.3.1. Overview ................................................................................. 351
9.3.2. Internet Key Exchange (IKE) ....................................................... 351
9.3.3. IKE Authentication .................................................................... 357
9.3.4. IPsec Protocols (ESP/AH) ........................................................... 358
9.3.5. NAT Traversal .......................................................................... 359
9.3.6. Algorithm Proposal Lists ............................................................. 360
9.3.7. Pre-shared Keys ........................................................................ 362
9.3.8. Identification Lists ..................................................................... 363
9.4. IPsec Tunnels ...................................................................................... 365
9.4.1. Overview ................................................................................. 365
9.4.2. LAN to LAN Tunnels with Pre-shared Keys ................................... 366
9.4.3. Roaming Clients ........................................................................ 366
9.4.4. Fetching CRLs from an alternate LDAP server ................................ 371
9.4.5. Troubleshooting with ikesnoop ..................................................... 372
9.4.6. IPsec Advanced Settings ............................................................. 379
9.5. PPTP/L2TP ......................................................................................... 383
9.5.1. PPTP Servers ............................................................................ 383
9.5.2. L2TP Servers ............................................................................ 384
9.5.3. L2TP/PPTP Server advanced settings ............................................ 388
9.5.4. PPTP/L2TP Clients .................................................................... 389
9.6. CA Server Access ................................................................................ 392
9.7. VPN Troubleshooting ........................................................................... 395
9.7.1. General Troubleshooting ............................................................. 395
9.7.2. Troubleshooting Certificates ........................................................ 395
9.7.3. IPsec Troubleshooting Commands ................................................ 396
9.7.4. Management Interface Failure with VPN ........................................ 397
9.7.5. Specific Error Messages .............................................................. 397
9.7.6. Specific Symptoms .................................................................... 399
10. Traffic Management ...................................................................................... 402
10.1. Traffic Shaping .................................................................................. 402
10.1.1. Overview ................................................................................ 402
10.1.2. Traffic Shaping in NetDefendOS ................................................. 403
7
User Manual

Advertisement

Table of Contents
loading

Table of Contents