Policy................................................................................................... 27
Policy modes.............................................................................................27
Action Types..............................................................................................27
Source and Destination Filter ....................................................................28
Service Filter .............................................................................................28
Schedule ...................................................................................................28
Intrusion Detection / Prevention ................................................................29
Add a new policy .......................................................................................29
Change order of policy ..............................................................................30
Delete policy .............................................................................................30
Configure Intrusion Detection....................................................................30
Configure Intrusion Prevention..................................................................31
Port mapping / Virtual Servers ............................................................ 32
Add a new mapping ..................................................................................32
Delete mapping .........................................................................................33
Users................................................................................................... 34
The DFL-200 RADIUS Support .................................................................34
Enable User Authentication via HTTP / HTTPS.........................................35
Enable RADIUS Support ...........................................................................35
Add User ...................................................................................................36
Change User Password ............................................................................36
Delete User ...............................................................................................37
Schedules ........................................................................................... 38
Add new recurring schedule......................................................................38
Services .............................................................................................. 39
Adding TCP, UDP or TCP/UDP Service ....................................................39
Adding IP Protocol ....................................................................................40
Grouping Services.....................................................................................40
Protocol-independent settings...................................................................41
VPN..................................................................................................... 42
Introduction to IPSec.................................................................................42
Introduction to PPTP .................................................................................43
Introduction to L2TP..................................................................................43
Point-to-Point Protocol ..............................................................................43
Authentication Protocols............................................................................44
PAP ............................................................................................................44
CHAP .........................................................................................................44
MS-CHAP v1 ..............................................................................................44
MS-CHAP v2 ..............................................................................................44
MPPE, Microsoft Point-To-Point Encryption ..............................................44
L2TP/PPTP Clients ...................................................................................45
L2TP/PPTP Servers..................................................................................46
VPN between two networks ......................................................................48
VPN between two networks ......................................................................48
Creating a LAN-to-LAN IPSec VPN Tunnel ...............................................48