Setting time and date manually .................................................................27
Firewall ........................................................................................... 28
Policy................................................................................................... 28
Policy modes.............................................................................................28
Action Types..............................................................................................28
Source and Destination Filter ....................................................................29
Service Filter .............................................................................................29
Schedule ...................................................................................................29
Intrusion Detection / Prevention ................................................................29
Traffic Shaping ..........................................................................................30
Add a new policy .......................................................................................31
Change order of policy ..............................................................................32
Delete policy .............................................................................................32
Configure Intrusion Detection....................................................................32
Configure Intrusion Prevention..................................................................33
Port mapping / Virtual Servers ............................................................ 34
Add a new mapping ..................................................................................34
Delete mapping .........................................................................................35
Administrative users............................................................................ 36
Add Administrative User ............................................................................36
Change Administrative User Access level .................................................37
Change Administrative User Password .....................................................37
Delete Administrative User........................................................................38
Users................................................................................................... 39
The DFL-700 RADIUS Support .................................................................39
Enable User Authentication via HTTP / HTTPS.........................................40
Enable RADIUS Support ...........................................................................40
Add User ...................................................................................................41
Change User Password ............................................................................41
Delete User ...............................................................................................42
Schedules ........................................................................................... 43
Add new recurring schedule......................................................................43
Services .............................................................................................. 44
Adding TCP, UDP or TCP/UDP Service ....................................................44
Adding IP Protocol ....................................................................................45
Grouping Services.....................................................................................45
Protocol-independent settings...................................................................46
VPN..................................................................................................... 47
Introduction to IPsec .................................................................................47
Introduction to PPTP .................................................................................48
Introduction to L2TP..................................................................................48
Point-to-Point Protocol ..............................................................................48
Authentication Protocols............................................................................49
PAP ............................................................................................................49
CHAP .........................................................................................................49