D-Link DSR-150 User Manual page 4

Services router
Hide thumbs Also See for DSR-150:
Table of Contents

Advertisement

3.8
WAN Port Settings .................................................................................................. 65
 
Wireless Access Point Setup ............................................................................................. 67
 
4.1
Wireless Settings Wizard ....................................................................................... 67
 
4.1.1
Wireless Network Setup Wizard ........................................................................... 68
 
4.1.2
Add Wireless Device with WPS ............................................................................ 68
 
4.1.3
Manual Wireless Network Setup .......................................................................... 69
 
4.2
Wireless Profiles ..................................................................................................... 69
 
4.2.1
WEP Security .......................................................................................................... 70
 
4.2.2
WPA or WPA2 with PSK ........................................................................................ 71
 
4.3
Creating and Using Access Points ....................................................................... 71
 
4.3.1
Primary benefits of Virtual APs: ............................................................................ 73
 
4.4
Tuning Radio Specific Settings ............................................................................. 74
 
4.5
WMM ......................................................................................................................... 74
 
4.6
Wireless distribution system (WDS) ..................................................................... 75
 
4.7
Advanced Wireless Settings .................................................................................. 77
 
4.8
Wi-Fi Protected Setup (WPS) ............................................................................... 78
 
Securing the Private Network ............................................................................................ 81
 
5.1
Firewall Rules .......................................................................................................... 81
 
5.2
Defining Rule Schedules ....................................................................................... 82
 
5.3
Configuring Firewall Rules ..................................................................................... 83
 
5.4
Configuring IPv6 Firewall Rules ............................................................................ 88
 
5.4.1
Firewall Rule Configuration Examples ................................................................. 90
 
5.5
Security on Custom Services ................................................................................ 94
 
5.6
ALG support ............................................................................................................. 97
 
5.7
VPN Passthrough for Firewall ............................................................................... 98
 
5.8
Application Rules .................................................................................................... 99
 
5.9
Web Content Filtering ........................................................................................... 100
 
5.9.1
Content Filtering .................................................................................................... 100
 
5.9.2
Approved URLs ..................................................................................................... 101
 
5.9.3
Blocked Keywords ................................................................................................ 102
 
5.9.4
Export Web Filter .................................................................................................. 103
 
5.10
IP/MAC Binding ..................................................................................................... 104
 
5.11
Intrusion Prevention (IPS).................................................................................... 105
 
5.12
Protecting from Internet Attacks ......................................................................... 106
 
5.13
IGMP Proxy to manage multicast traffic ............................................................ 108
 
IPsec / PPTP / L2TP VPN ................................................................................................ 110
 
6.1
VPN Wizard ........................................................................................................... 112
 
6.2
Configuring IPsec Policies ................................................................................... 114
 
6.2.1
Extended Authentication (XAUTH) ..................................................................... 118
 
6.2.2
Internet over IPsec tunnel .................................................................................... 119
 
6.3
Configuring VPN clients ....................................................................................... 119
 
6.4
PPTP / L2TP Tunnels ........................................................................................... 119
 
6.4.1
PPTP Tunnel Support .......................................................................................... 119
 
6.4.2
L2TP Tunnel Support ........................................................................................... 121
 
3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents