Firewall ........................................................................................... 28
Policy................................................................................................... 28
Policy modes.............................................................................................28
Action Types..............................................................................................28
Service Filter .............................................................................................29
Schedule ...................................................................................................29
Traffic Shaping ..........................................................................................30
Add a new policy .......................................................................................31
Delete policy .............................................................................................32
Add a new mapping ..................................................................................34
Delete mapping .........................................................................................35
Users................................................................................................... 39
Add User ...................................................................................................41
Delete User ...............................................................................................42
Schedules ........................................................................................... 43
Services .............................................................................................. 44
Adding IP Protocol ....................................................................................45
Grouping Services.....................................................................................45
VPN..................................................................................................... 47
Introduction to IPsec .................................................................................47
Introduction to PPTP .................................................................................48
Introduction to L2TP..................................................................................48
PAP ............................................................................................................49
CHAP .........................................................................................................49