Policy
...................................................................................................
27
Policy modes
.............................................................................................
27
Action Types
..............................................................................................
27
Source and Destination Filter
....................................................................
28
Service Filter
.............................................................................................
28
Schedule
...................................................................................................
28
Intrusion Detection / Prevention
................................................................
29
Add a new policy
.......................................................................................
29
Change order of policy
..............................................................................
30
Delete policy
.............................................................................................
30
Configure Intrusion Detection
....................................................................
30
Configure Intrusion Prevention
..................................................................
31
Port mapping / Virtual Servers
............................................................
32
Add a new mapping
..................................................................................
32
Delete mapping
.........................................................................................
33
Users
...................................................................................................
34
The DFL-200 RADIUS Support
.................................................................
34
Enable User Authentication via HTTP / HTTPS
.........................................
35
Enable RADIUS Support
...........................................................................
35
Add User
...................................................................................................
36
Change User Password
............................................................................
36
Delete User
...............................................................................................
37
Schedules
...........................................................................................
38
Add new recurring schedule
......................................................................
38
Services
..............................................................................................
39
Adding TCP, UDP or TCP/UDP Service
....................................................
39
Adding IP Protocol
....................................................................................
40
Grouping Services
.....................................................................................
40
Protocol-independent settings
...................................................................
41
VPN
.....................................................................................................
42
Introduction to IPSec
.................................................................................
42
Introduction to PPTP
.................................................................................
43
Introduction to L2TP
..................................................................................
43
Point-to-Point Protocol
..............................................................................
43
Authentication Protocols
............................................................................
44
PAP
............................................................................................................
44
CHAP
.........................................................................................................
44
MS-CHAP v1
..............................................................................................
44
MS-CHAP v2
..............................................................................................
44
MPPE, Microsoft Point-To-Point Encryption
..............................................
44
L2TP/PPTP Clients
...................................................................................
45
L2TP/PPTP Servers
..................................................................................
46
VPN between two networks
......................................................................
48
VPN between two networks
......................................................................
48
Creating a LAN-to-LAN IPSec VPN Tunnel
...............................................
48