Using NTP to sync time...............................................................................27
Setting time and date manually...................................................................27
Firewall..........................................................................................28
Policy................................................................................................... 28
Policy modes...............................................................................................28
Action Types................................................................................................28
Source and Destination Filter......................................................................29
Service Filter ...............................................................................................29
Schedule .....................................................................................................29
Intrusion Detection / Prevention..................................................................29
Traffic Shaping ............................................................................................30
Add a new policy.........................................................................................31
Change order of policy................................................................................32
Delete policy................................................................................................32
Configure Intrusion Detection .....................................................................32
Configure Intrusion Prevention ...................................................................33
Port mapping / Virtual Servers ............................................................ 34
Add a new mapping ....................................................................................34
Delete mapping...........................................................................................35
Administrative users............................................................................ 36
Add Administrative User..............................................................................36
Change Administrative User Access level ..................................................37
Change Administrative User Password.......................................................37
Delete Administrative User..........................................................................38
Users................................................................................................... 39
The DFL-700 RADIUS Support...................................................................39
Enable User Authentication via HTTP / HTTPS..........................................40
Enable RADIUS Support.............................................................................40
Add User .....................................................................................................41
Change User Password ..............................................................................41
Delete User .................................................................................................42
Schedules ........................................................................................... 43
Add new recurring schedule .......................................................................43
Services .............................................................................................. 44
Adding TCP, UDP or TCP/UDP Service......................................................44
Adding IP Protocol ......................................................................................45
Grouping Services ......................................................................................45
Protocol-independent settings ....................................................................46
VPN..................................................................................................... 47
Introduction to IPsec ...................................................................................47
Introduction to PPTP...................................................................................48
Introduction to L2TP....................................................................................48
Point-to-Point Protocol ................................................................................48
Authentication Protocols .............................................................................49
PAP...............................................................................................................49