NetComm NTC-400 Series User Manual page 347

Hide thumbs Also See for NTC-400 Series:
Table of Contents

Advertisement

Figure 231 – VPN ....................................................................................................................................................................................................................... 200
Figure 232 – IPSec Tunnel Scenarios .......................................................................................................................................................................................... 201
Figure 233 – Site to Site with Full Tunnel enabled ..................................................................................................................................................................... 202
Figure 234 – Site to Site with Hub and Spoke mechanism ......................................................................................................................................................... 202
Figure 235 – Dynamic VPN Server Scenario ............................................................................................................................................................................... 203
Figure 236 – Enable IPSec .......................................................................................................................................................................................................... 203
Figure 237 – IPSec Tunnel Configuration ................................................................................................................................................................................... 204
Figure 238 – Local & Remote Configuration .............................................................................................................................................................................. 205
Figure 239 – IPSec Authentication ............................................................................................................................................................................................. 205
Figure 240 – IPSec IKE Phase...................................................................................................................................................................................................... 206
Figure 241 – IKE Proposal Definition .......................................................................................................................................................................................... 207
Figure 242 – IPSec Phase ........................................................................................................................................................................................................... 208
Figure 243 – IPSec Proposal Definition ...................................................................................................................................................................................... 208
Figure 244 – Manual Key Management ..................................................................................................................................................................................... 209
Figure 245 – Manual Proposal ................................................................................................................................................................................................... 210
Figure 246 – Dynamic Server List ............................................................................................................................................................................................... 211
Figure 247 – Dynamic VPN Server.............................................................................................................................................................................................. 211
Figure 248 – Local & Remote Configuration .............................................................................................................................................................................. 212
Figure 249 – Authentication ...................................................................................................................................................................................................... 212
Figure 250 – OpenVPN TUN Scenario ........................................................................................................................................................................................ 214
Figure 251 – OpenVPN TAP Scenario ......................................................................................................................................................................................... 215
Figure 252 – Open VPN Configuration ....................................................................................................................................................................................... 215
Figure 253 – OpenVPN Server Configuration ............................................................................................................................................................................. 216
Figure 254 – OpenVPN Server Advanced Configuration ............................................................................................................................................................ 219
Figure 255 – OpenVPN Client List .............................................................................................................................................................................................. 220
Figure 256 – OpenVPN Client Configuration .............................................................................................................................................................................. 220
Figure 257 – OpenVPN Client Advanced Configuration ............................................................................................................................................................. 223
Figure 258 – L2TP ....................................................................................................................................................................................................................... 225
Figure 259 – Enable L2TP VPN Security...................................................................................................................................................................................... 226
Figure 260 – L2TP Server Configuration ..................................................................................................................................................................................... 226
Figure 261 – L2TP Server Status list ......................................................................................................................................................................................... 227
Figure 262 – User Account Configuration .................................................................................................................................................................................. 228
Figure 263 – L2TP Client Configuration ...................................................................................................................................................................................... 228
Figure 264 – L2TP Client List & Status ........................................................................................................................................................................................ 229
Figure 265 – L2TP Client List & Status ........................................................................................................................................................................................ 229
Figure 266 – L2TP Client Configuration ...................................................................................................................................................................................... 230
Figure 267 – PPTP ...................................................................................................................................................................................................................... 233
Figure 268 – Enable PPTP........................................................................................................................................................................................................... 233
Figure 269 – PPTP Server Configuration .................................................................................................................................................................................... 234
Figure 270 – PPTP Server Status ................................................................................................................................................................................................ 235
Figure 271 – PPTP Client Configuration ................................................................................................................................................................................... 235
Figure 272 – PPTP Client List & Status ....................................................................................................................................................................................... 235
Figure 273 – PPTP Client Configuration ..................................................................................................................................................................................... 236
Figure 274 – GRE Tunnel Scenario ............................................................................................................................................................................................. 239
Figure 275 – Enable GRE Tunnel ................................................................................................................................................................................................ 239
Figure 276 – GRE Tunnel List...................................................................................................................................................................................................... 240
Figure 277 – GRE Rule Configuration ......................................................................................................................................................................................... 241
Figure 278 – Firewall .................................................................................................................................................................................................................. 243
Figure 279 – Packet Filter with White List Scenario ................................................................................................................................................................... 243
Figure 280 – Enable Packet Filters ............................................................................................................................................................................................. 244
Figure 281 – Packet Filter Rule Configuration ............................................................................................................................................................................ 245
Figure 282 – URL Blocking Rule with Black List .......................................................................................................................................................................... 247
Figure 283 – Enable URL Blocking .............................................................................................................................................................................................. 248
Figure 284 – URL Blocking Rule List ........................................................................................................................................................................................... 249
Figure 285 – URL Blocking Rule Configuration ........................................................................................................................................................................... 249
Figure 286 – Content filter ......................................................................................................................................................................................................... 251
Figure 287 – Enable Web content Filters ................................................................................................................................................................................... 251
Figure 288 – Web Content Filter List ......................................................................................................................................................................................... 252
Figure 289 – MAC Control with Black List Scenario .................................................................................................................................................................... 254
NTC-400 Series
347 of 359
© NetComm Wireless 2019

Advertisement

Table of Contents
loading

Table of Contents