D-Link DFL-1500 User Manual page 4

D-link dfl-1500 vpn/firewall router
Hide thumbs Also See for DFL-1500:
Table of Contents

Advertisement

5.3.4
ICMP .............................................................................................................................................................. 32
NAT¡ B Routing & Firewall .................................................................................................................34
Chapter 6 NAT ....................................................................................................................................................35
6.1
Demands................................................................................................................................................................... 35
6.2
Objectives................................................................................................................................................................. 35
6.3
Methods.................................................................................................................................................................... 36
6.4
Steps ......................................................................................................................................................................... 36
6.4.1
Setup Many-to-one NAT rules........................................................................................................................ 36
6.4.2
Setup Virtual Server for the FtpServer1 ......................................................................................................... 40
Chapter 7 Routing...............................................................................................................................................45
7.1
Demands................................................................................................................................................................... 45
7.2
Objectives................................................................................................................................................................. 45
7.3
Methods.................................................................................................................................................................... 46
7.4
Steps ......................................................................................................................................................................... 46
7.4.1
Add a static routing entry................................................................................................................................ 46
7.4.2
Add a policy routing entry .............................................................................................................................. 47
Chapter 8 Firewall...............................................................................................................................................49
8.1
Demands................................................................................................................................................................... 49
8.2
Objectives................................................................................................................................................................. 49
8.3
Methods.................................................................................................................................................................... 49
8.4
Steps ......................................................................................................................................................................... 50
8.4.1
8.4.2
Setup Alert detected attack ............................................................................................................................. 51
Virtual Private Network ......................................................................................................................54
Chapter 9 VPN Technical Introduction...............................................................................................................55
9.1
Terminology Explanation......................................................................................................................................... 55
9.1.1
VPN ................................................................................................................................................................ 55
9.1.2
IPSec............................................................................................................................................................... 55
9.1.3
Security Association ....................................................................................................................................... 55
9.1.4
IPSec Algorithms............................................................................................................................................ 55
9.1.5
Key Management............................................................................................................................................ 55
9.1.6
Encapsulation.................................................................................................................................................. 56
9.1.7
IPSec Protocols............................................................................................................................................... 57
9.2
Make VPN packets pass through DFL-1500 ............................................................................................................ 57
Chapter 10 Virtual Private Network - IPSec ......................................................................................................59
10.1
Demands................................................................................................................................................................... 59
10.2
Objectives................................................................................................................................................................. 59
10.3
Methods.................................................................................................................................................................... 59
10.4
Steps ......................................................................................................................................................................... 60
¡ @
DES/MD5 IPSec tunnel: the IKE way............................................................................................................ 60
¡ @
DES/MD5 IPSec tunnel: the Manual-Key way .............................................................................................. 67
Chapter 11 Virtual Private Network - PPTP.......................................................................................................75
11.1
Demands................................................................................................................................................................... 75
11.2
Objectives................................................................................................................................................................. 75
11.3
Methods.................................................................................................................................................................... 75
WAN) .................................................................................................... 50
II

Advertisement

Table of Contents
loading

Table of Contents