D-Link DFL-1000 [5/168] Example policies 5

D-Link DFL-1000 [5/168] Example policies 5
DFL-1000 User Manual
5
Configuring IP/MAC binding for packets going through the firewall...................................................52
Configuring IP/MAC binding for packets going to the firewall............................................................53
Adding IP/MAC addresses .................................................................................................................53
Viewing the dynamic IP/MAC list........................................................................................................53
Enabling IP/MAC binding....................................................................................................................54
Example policies......................................................................................55
NAT policy for public access to a server ................................................................................................55
Routing policy for access to a server from the internal network.............................................................55
Transparent mode policy for public access to a server..........................................................................56
Denying connections from the Internet...................................................................................................57
Using a schedule to deny access.......................................................................................................57
Denying connections to the Internet.......................................................................................................57
Adding policies that accept connections.................................................................................................58
Requiring authentication to connect to the Internet................................................................................59
Users and authentication........................................................................61
Setting authentication timeout................................................................................................................61
Adding user names and configuring authentication ...............................................................................61
Adding user names and configuring authentication...........................................................................62
Deleting user names from the internal database ...............................................................................62
Configuring RADIUS support..................................................................................................................63
Adding RADIUS servers.....................................................................................................................63
Deleting RADIUS servers...................................................................................................................63
Configuring user groups .........................................................................................................................64
Adding user groups ............................................................................................................................64
Deleting user groups ..........................................................................................................................65
IPSec VPNs...............................................................................................66
Interoperability with IPSec VPN products...............................................................................................67
Configuring AutoIKE key IPSec VPN .....................................................................................................67
Configuring manual key IPSec VPN.......................................................................................................68
Configuring dialup VPN ..........................................................................................................................68
Configuring a VPN Concentrator for hub and spoke VPN......................................................................69
Configuring the VPN Concentrator.....................................................................................................69
Configuring the member VPNs...........................................................................................................70
Configuring IPSec redundancy...............................................................................................................71
Adding a remote gateway.......................................................................................................................71
About dialup VPN authentication........................................................................................................73
About DH groups................................................................................................................................75
About the P1 proposal........................................................................................................................75
About NAT traversal...........................................................................................................................75
Adding an AutoIKE key VPN tunnel .......................................................................................................76
About the P2 proposal........................................................................................................................77
About replay detection........................................................................................................................77

Содержание

Скачать