D-Link DFL-1660 User Manual page 7

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

6.6.10. Distributed DoS Attacks ............................................................ 364
6.7. Blacklisting Hosts and Networks ............................................................. 366
7. Address Translation ........................................................................................ 369
7.1. Overview ............................................................................................ 369
7.2. NAT .................................................................................................. 370
7.3. NAT Pools .......................................................................................... 375
7.4. SAT ................................................................................................... 378
7.4.1. Translation of a Single IP Address (1:1) ......................................... 378
7.4.2. Translation of Multiple IP Addresses (M:N) .................................... 383
7.4.3. All-to-One Mappings (N:1) ......................................................... 385
7.4.4. Port Translation ......................................................................... 387
7.4.5. Protocols Handled by SAT .......................................................... 387
7.4.6. Multiple SAT Rule Matches ......................................................... 387
7.4.7. SAT and FwdFast Rules .............................................................. 388
8. User Authentication ........................................................................................ 391
8.1. Overview ............................................................................................ 391
8.2. Authentication Setup ............................................................................. 393
8.2.1. Setup Summary ......................................................................... 393
8.2.2. The Local Database .................................................................... 393
8.2.3. External RADIUS Servers ........................................................... 395
8.2.4. External LDAP Servers ............................................................... 395
8.2.5. Authentication Rules .................................................................. 402
8.2.6. Authentication Processing ........................................................... 404
8.2.7. A Group Usage Example ............................................................. 405
8.2.8. HTTP Authentication ................................................................. 405
8.3. Customizing Authentication HTML Pages ................................................ 410
9. VPN ............................................................................................................. 415
9.1. Overview ............................................................................................ 415
9.1.1. VPN Usage ............................................................................... 415
9.1.2. VPN Encryption ........................................................................ 416
9.1.3. VPN Planning ........................................................................... 417
9.1.4. Key Distribution ........................................................................ 417
9.1.5. The TLS Alternative for VPN ...................................................... 418
9.2. VPN Quick Start .................................................................................. 419
9.2.1. IPsec LAN to LAN with Pre-shared Keys ....................................... 420
9.2.2. IPsec LAN to LAN with Certificates ............................................. 421
9.2.3. IPsec Roaming Clients with Pre-shared Keys .................................. 422
9.2.4. IPsec Roaming Clients with Certificates ......................................... 424
9.2.5. L2TP Roaming Clients with Pre-Shared Keys ................................. 425
9.2.6. L2TP Roaming Clients with Certificates ........................................ 427
9.2.7. PPTP Roaming Clients ............................................................... 427
9.3. IPsec Components ................................................................................ 429
9.3.1. Overview ................................................................................. 429
9.3.2. Internet Key Exchange (IKE) ....................................................... 429
9.3.3. IKE Authentication .................................................................... 435
9.3.4. IPsec Protocols (ESP/AH) ........................................................... 436
9.3.5. NAT Traversal .......................................................................... 437
9.3.6. Algorithm Proposal Lists ............................................................. 439
9.3.7. Pre-shared Keys ........................................................................ 440
9.3.8. Identification Lists ..................................................................... 441
9.4. IPsec Tunnels ...................................................................................... 444
9.4.1. Overview ................................................................................. 444
9.4.2. LAN to LAN Tunnels with Pre-shared Keys ................................... 446
9.4.3. Roaming Clients ........................................................................ 446
9.4.4. Fetching CRLs from an alternate LDAP server ................................ 451
9.4.5. Troubleshooting with ikesnoop ..................................................... 452
9.4.6. IPsec Advanced Settings ............................................................. 459
9.5. PPTP/L2TP ......................................................................................... 463
9.5.1. PPTP Servers ............................................................................ 463
9.5.2. L2TP Servers ............................................................................ 464
9.5.3. L2TP/PPTP Server advanced settings ............................................ 469
9.5.4. PPTP/L2TP Clients .................................................................... 469
7
User Manual

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560Dfl-2560gDfl-260eDfl-860e

Table of Contents