D-Link DFL-1660 User Manual page 7

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

7.3.6. Multiple SAT Rule Matches ......................................................... 307
7.3.7. SAT and FwdFast Rules .............................................................. 308
8. User Authentication ........................................................................................ 311
8.1. Overview ............................................................................................ 311
8.2. Authentication Setup ............................................................................. 313
8.2.1. Setup Summary ......................................................................... 313
8.2.2. The Local Database .................................................................... 313
8.2.3. External RADIUS Servers ........................................................... 313
8.2.4. External LDAP Servers ............................................................... 314
8.2.5. Authentication Rules .................................................................. 318
8.2.6. Authentication Processing ........................................................... 320
8.2.7. HTTP Authentication ................................................................. 320
8.3. Customizing HTML Pages ..................................................................... 325
9. VPN ............................................................................................................. 329
9.1. Overview ............................................................................................ 329
9.1.1. VPN Usage ............................................................................... 329
9.1.2. VPN Encryption ........................................................................ 330
9.1.3. VPN Planning ........................................................................... 330
9.1.4. Key Distribution ........................................................................ 331
9.1.5. The TLS Alternative for VPN ...................................................... 331
9.2. VPN Quick Start .................................................................................. 333
9.2.1. IPsec LAN to LAN with Pre-shared Keys ....................................... 334
9.2.2. IPsec LAN to LAN with Certificates ............................................. 335
9.2.3. IPsec Roaming Clients with Pre-shared Keys .................................. 336
9.2.4. IPsec Roaming Clients with Certificates ......................................... 338
9.2.5. L2TP Roaming Clients with Pre-Shared Keys ................................. 339
9.2.6. L2TP Roaming Clients with Certificates ........................................ 340
9.2.7. PPTP Roaming Clients ............................................................... 341
9.3. IPsec Components ................................................................................ 343
9.3.1. Overview ................................................................................. 343
9.3.2. Internet Key Exchange (IKE) ....................................................... 343
9.3.3. IKE Authentication .................................................................... 349
9.3.4. IPsec Protocols (ESP/AH) ........................................................... 350
9.3.5. NAT Traversal .......................................................................... 351
9.3.6. Algorithm Proposal Lists ............................................................. 352
9.3.7. Pre-shared Keys ........................................................................ 354
9.3.8. Identification Lists ..................................................................... 355
9.4. IPsec Tunnels ...................................................................................... 357
9.4.1. Overview ................................................................................. 357
9.4.2. LAN to LAN Tunnels with Pre-shared Keys ................................... 358
9.4.3. Roaming Clients ........................................................................ 358
9.4.4. Fetching CRLs from an alternate LDAP server ................................ 363
9.4.5. Troubleshooting with ikesnoop ..................................................... 364
9.4.6. IPsec Advanced Settings ............................................................. 371
9.5. PPTP/L2TP ......................................................................................... 375
9.5.1. PPTP Servers ............................................................................ 375
9.5.2. L2TP Servers ............................................................................ 376
9.5.3. L2TP/PPTP Server advanced settings ............................................ 380
9.5.4. PPTP/L2TP Clients .................................................................... 381
9.6. CA Server Access ................................................................................ 383
9.7. VPN Troubleshooting ........................................................................... 386
10. Traffic Management ...................................................................................... 390
10.1. Traffic Shaping .................................................................................. 390
10.1.1. Introduction ............................................................................ 390
10.1.2. Traffic Shaping in NetDefendOS ................................................. 391
10.1.3. Simple Bandwidth Limiting ....................................................... 393
10.1.4. Limiting Bandwidth in Both Directions ........................................ 394
10.1.5. Creating Differentiated Limits with Chains ................................... 395
10.1.6. Precedences ............................................................................ 396
10.1.7. Guarantees .............................................................................. 398
10.1.8. Differentiated Guarantees .......................................................... 398
10.1.9. Groups ................................................................................... 399
10.1.10. Recommendations .................................................................. 400
7
User Manual

Advertisement

Table of Contents
loading

Table of Contents