Policy................................................................................................... 27
Policy modes.............................................................................................27
Action Types..............................................................................................27
Source and Destination Filter ....................................................................28
Service Filter .............................................................................................28
Schedule ...................................................................................................28
Intrusion Detection / Prevention ................................................................29
Add a new policy .......................................................................................29
Change order of policy ..............................................................................30
Delete policy .............................................................................................30
Configure Intrusion Detection....................................................................30
Configure Intrusion Prevention..................................................................31
Port mapping / Virtual Servers ............................................................ 32
Add a new mapping ..................................................................................32
Delete mapping .........................................................................................33
Users................................................................................................... 34
The DFL-200 RADIUS Support .................................................................34
Enable User Authentication via HTTP / HTTPS.........................................35
Enable RADIUS Support ...........................................................................35
Add User ...................................................................................................36
Change User Password ............................................................................36
Delete User ...............................................................................................37
Schedules ........................................................................................... 38
Add new recurring schedule......................................................................38
Services .............................................................................................. 39
Adding TCP, UDP or TCP/UDP Service ....................................................39
Adding IP Protocol ....................................................................................40
Grouping Services.....................................................................................40
Protocol-independent settings...................................................................41
VPN..................................................................................................... 42
Introduction to IPSec.................................................................................42
Introduction to PPTP .................................................................................43
Introduction to L2TP..................................................................................43
Point-to-Point Protocol ..............................................................................43
Authentication Protocols............................................................................44
PAP ............................................................................................................44
CHAP .........................................................................................................44
MS-CHAP v1 ..............................................................................................44
MS-CHAP v2 ..............................................................................................44
MPPE, Microsoft Point-To-Point Encryption ..............................................44
L2TP/PPTP Clients ...................................................................................45
L2TP/PPTP Servers ..................................................................................46
VPN between two networks ......................................................................48
VPN between two networks ......................................................................48
Creating a LAN-to-LAN IPSec VPN Tunnel ...............................................48
Summary of Contents for DFL-200 - Security Appliance
Page 102: ...102 5 Select Connect to the network at my workplace and click Next ...
Page 103: ...6 Select Virtual Private Network connection and click Next ...
Page 104: ...104 7 Name the connection MainOffice and click Next ...
Page 105: ...8 Select Do not dial the initial connection and click Next ...
Page 106: ...106 9 Type the IP address to the server 194 0 2 20 and click Next 10 Click Finish ...
Page 129: ...VCCI Warning ...
Page 132: ...132 ...
Page 133: ......