Firewall..........................................................................................28
Policy................................................................................................... 28
Policy modes...............................................................................................28
Action Types................................................................................................28
Source and Destination Filter......................................................................28
Service Filter ...............................................................................................29
Schedule .....................................................................................................29
Intrusion Detection / Prevention..................................................................30
Traffic Shaping ............................................................................................30
Add a new policy.........................................................................................31
Change order of policy................................................................................32
Delete policy................................................................................................32
Configure Intrusion Detection .....................................................................32
Configure Intrusion Prevention ...................................................................33
Port mapping / Virtual Servers ............................................................ 34
Add a new mapping ....................................................................................34
Delete mapping...........................................................................................35
Administrative users............................................................................ 36
Add Administrative User..............................................................................36
Change Administrative User Access level ..................................................37
Change Administrative User Password.......................................................37
Delete Administrative User..........................................................................38
Users................................................................................................... 39
The DFL-700 RADIUS Support...................................................................39
Enable User Authentication via HTTP / HTTPS..........................................40
Enable RADIUS Support.............................................................................40
Add User .....................................................................................................41
Change User Password ..............................................................................41
Delete User .................................................................................................42
Schedules ........................................................................................... 43
Add new recurring schedule .......................................................................43
Add new one-time schedule........................................................................44
Services .............................................................................................. 45
Adding TCP, UDP or TCP/UDP Service......................................................45
Adding IP Protocol ......................................................................................46
Grouping Services ......................................................................................46
Protocol-independent settings ....................................................................47
VPN..................................................................................................... 48
Introduction to IPSec...................................................................................48
Introduction to PPTP...................................................................................48
Introduction to L2TP....................................................................................49
Point-to-Point Protocol ................................................................................49
Authentication Protocols .............................................................................50
MPPE, Microsoft Point-To-Point Encryption................................................50
L2TP/PPTP Clients .....................................................................................51
L2TP/PPTP Servers....................................................................................52