D-Link DFL-900 User Manual page 5

D-link dfl-900; dfl-1500 vpn/firewall router
Hide thumbs Also See for DFL-900:
Table of Contents

Advertisement

8.4.2
Add a policy routing entry..............................................................................................................................78
8.5
The priority of the routing........................................................................................................................................81
Firewall & IP/MAC Binding ..............................................................................................................84
Chapter 9 IP/Services grouping ..........................................................................................................................85
9.1
Demands ..................................................................................................................................................................85
9.2
Objectives ................................................................................................................................................................85
9.3
Methods ...................................................................................................................................................................85
9.4
Steps.........................................................................................................................................................................85
9.4.1
Setup Address.................................................................................................................................................85
9.4.2
Setup Service..................................................................................................................................................89
9.4.3
Setup Schedule ...............................................................................................................................................91
Chapter 10 Firewall ............................................................................................................................................93
10.1
Demands ..................................................................................................................................................................93
10.2
Objectives ................................................................................................................................................................93
10.3
Methods ...................................................................................................................................................................93
10.4
Steps.........................................................................................................................................................................94
Block internal PC session (LAN à WAN)....................................................................................................94
10.4.1
10.4.2
Setup Anti-DoS ..............................................................................................................................................97
Chapter 11 IP/MAC Binding ..............................................................................................................................99
11.1
Demands ..................................................................................................................................................................99
11.2
Objectives ................................................................................................................................................................99
11.3
Methods ...................................................................................................................................................................99
11.4
Steps.........................................................................................................................................................................99
Virtual Private Network ....................................................................................................................103
Chapter 12 VPN Technical Introduction ..........................................................................................................104
12.1
VPN benefit ...........................................................................................................................................................104
12.2
Related Terminology Explanation .........................................................................................................................104
12.2.1
VPN..............................................................................................................................................................104
12.2.2
IPSec ............................................................................................................................................................104
12.2.3
Security Association.....................................................................................................................................104
12.2.4
IPSec Algorithms .........................................................................................................................................104
12.2.5
Key Management .........................................................................................................................................105
12.2.6
Encapsulation ...............................................................................................................................................106
12.2.7
IPSec Protocols ............................................................................................................................................106
12.3
Make VPN packets pass through DFL-1500 .........................................................................................................107
Chapter 13 Virtual Private Network - IPSec ....................................................................................................109
13.1
Demands ................................................................................................................................................................109
13.2
Objectives ..............................................................................................................................................................109
13.3
Methods .................................................................................................................................................................109
13.4
Steps.......................................................................................................................................................................110
13.4.1
DES/MD5 IPSec tunnel: the IKE way .........................................................................................................110
13.4.2
DES/MD5 IPSec tunnel: the Manual-Key way ............................................................................................119
Chapter 14 Virtual Private Network -Dynamic IPSec .....................................................................................127
14.1
Demands ................................................................................................................................................................127
14.2
Objectives ..............................................................................................................................................................127
III

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-1500

Table of Contents