D-Link DWC-1000 User Manual page 13

Wireless controller
Hide thumbs Also See for DWC-1000:
Table of Contents

Advertisement

Wireless Controller
User Manual
Figure 139: SSLVPN Settings .............................................................................................................................. 247
Figure 140: Group login policies options .......................................................................................................... 248
Figure 141: Browser policies options ................................................................................................................. 249
Figure 142: IP policies options ............................................................................................................................. 250
Figure 143: A vailable Users with login status and associated Group .................................................... 251
Figure 144: User Configuration options ............................................................................................................ 253
Figure 145: List of SSL VPN polices (Global filter) ....................................................................................... 254
Figure 146: SSL VPN policy configuration ....................................................................................................... 255
Figure 148: List of A vailable Applications for SSL Port Forwarding ........................................................ 260
Figure 149: SSL VPN client adapter and access configuration ................................................................ 261
Figure 150: Configured client routes only apply in split tunnel mode ..................................................... 263
Figure 151: SSL VPN Portal configuration....................................................................................................... 265
Figure 152: List of current Active VPN Sessions ........................................................................................... 266
Figure 153: USB Device Detection ..................................................................................................................... 269
Figure 154: USB Share Port ................................................................................................................................. 270
Figure 155: Certificate summary for IPsec and HTTPS management ................................................... 272
®
AMT............................................................................................................................................ 273
Fi gu r e 15 7: W i r el es s C on f i gu r at i o n ..................................................................................................... 276
Fi gu r e 15 8: Dis t r ib ut e d Tu nn el in g ........................................................................................................ 279
Fi gu r e 15 9: Dis t r ib ut e d Tu nn el in g C li ent s ...................................................................................... 280
Fi gu r e 16 0: P e e r Co nt r oll e r C on f ig u r at i o n Re q u es t S t at us ............................................... 281
Fi gu r e 16 1: P e e r Co nt r oll e r C on f ig u r ait o n ..................................................................................... 283
Fi gu r e 16 2: W I DS A P C on f ig u r at i o n .................................................................................................... 288
Figure 163: WIDS Client Configuration ............................................................................................................. 291
Figure 164: Remote Management ...................................................................................................................... 292
Figure 165: SNMP Users, Traps, and Access Control ................................................................................ 294
Figure 166: SNMP system information for this controller ........................................................................... 295
Figure 167: SNMP Traps ....................................................................................................................................... 296
Figure 168: Date, Time, and NTP server setup ............................................................................................. 299
Figure 169: Facility settings for Logging ........................................................................................................... 301
Figure 170: Log configuration options for traffic through controller ......................................................... 303
Figure 171: E-mail configuration as a Remote Logging option ................................................................. 305
Figure 172: Syslog server configuration for Remote Logging (continued) ............................................ 306
Figure 173: VPN logs displayed in GUI event viewer .................................................................................. 307
Figure 174: SSL VPN logs displayed in GUI event viewer ......................................................................... 308
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents