D-Link DSR-150 User Manual page 9

Services router
Hide thumbs Also See for DSR-150:
Table of Contents

Advertisement

Unified Services Router
Figure 67: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ......................................................................................................... 101
Figure 68: Two trusted domains added to the Approved URLs List ................................................. 102
Figure 69: One keyword added to the block list ................................................................................... 103
Figure 70: Export Approved URL list ..................................................................................................... 104
Figure 71: The following example binds a LAN host's MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured .............................................................................................................. 105
Figure 72: Intrusion Prevention features on the router ....................................................................... 106
Figure 73: Protecting the router and LAN from internet attacks ........................................................ 107
Figure 74: Enabling IGMP Proxy for the LAN ....................................................................................... 109
Figure 75: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet .......................................................................................................................... 110
Figure 76: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway ........................................................................................................................ 111
Figure 77: VPN Wizard launch screen .................................................................................................. 112
Figure 78: IPsec policy configuration ..................................................................................................... 115
Figure 79: IPsec policy configuration continued (Auto policy via IKE) .............................................. 116
Figure 80: IPsec policy configuration continued (Auto / Manual Phase 2) ...................................... 118
Figure 81: PPTP tunnel configuration – PPTP Client .......................................................................... 120
Figure 82: PPTP VPN connection status .............................................................................................. 120
Figure 83: PPTP tunnel configuration – PPTP Server ........................................................................ 121
Figure 84: L2TP tunnel configuration – L2TP Server .......................................................................... 122
Figure 85: L2TP tunnel configuration – L2TP Client ........................................................................... 123
Figure 86: GRE Tunnel configuration .................................................................................................... 124
Figure 87: OpenVPN configuration ........................................................................................................ 126
Figure 88: OpenVPN Remote Network ................................................................................................. 127
Figure 89: OpenVPN Authentication ...................................................................................................... 128
Figure 90: Example of clientless SSL VPN connections to the DSR ................................................ 130
Figure 91: List of groups .......................................................................................................................... 131
Figure 92: User group configuration ...................................................................................................... 132
Figure 93: SSLVPN Settings ................................................................................................................... 133
Figure 94: Group login policies options ................................................................................................. 134
Figure 95: Browser policies options ....................................................................................................... 135
Figure 96: IP policies options .................................................................................................................. 136
Figure 97: Available Users with login status and associated Group ................................................. 137
Figure 98: User configuration options .................................................................................................... 138
8
User Manual
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents