Using NTP to sync time
...............................................................................
27
Setting time and date manually
...................................................................
27
Firewall
..........................................................................................
28
Policy
...................................................................................................
28
Policy modes
...............................................................................................
28
Action Types
................................................................................................
28
Source and Destination Filter
......................................................................
29
Service Filter
...............................................................................................
29
Schedule
.....................................................................................................
29
Intrusion Detection / Prevention
..................................................................
29
Traffic Shaping
............................................................................................
30
Add a new policy
.........................................................................................
31
Change order of policy
................................................................................
32
Delete policy
................................................................................................
32
Configure Intrusion Detection
.....................................................................
32
Configure Intrusion Prevention
...................................................................
33
Port mapping / Virtual Servers
............................................................
34
Add a new mapping
....................................................................................
34
Delete mapping
...........................................................................................
35
Administrative users
............................................................................
36
Add Administrative User
..............................................................................
36
Change Administrative User Access level
..................................................
37
Change Administrative User Password
.......................................................
37
Delete Administrative User
..........................................................................
38
Users
...................................................................................................
39
The DFL-700 RADIUS Support
...................................................................
39
Enable User Authentication via HTTP / HTTPS
..........................................
40
Enable RADIUS Support
.............................................................................
40
Add User
.....................................................................................................
41
Change User Password
..............................................................................
41
Delete User
.................................................................................................
42
Schedules
...........................................................................................
43
Add new recurring schedule
.......................................................................
43
Services
..............................................................................................
44
Adding TCP, UDP or TCP/UDP Service
......................................................
44
Adding IP Protocol
......................................................................................
45
Grouping Services
......................................................................................
45
Protocol-independent settings
....................................................................
46
VPN
.....................................................................................................
47
Introduction to IPsec
...................................................................................
47
Introduction to PPTP
...................................................................................
48
Introduction to L2TP
....................................................................................
48
Point-to-Point Protocol
................................................................................
48
Authentication Protocols
.............................................................................
49
PAP
...............................................................................................................
49