D-Link DSR-250N Network Router User Manual


 
Unified Services Router User Manual
7
Figure 33: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 61
Figure 34: Radio card configuration options ........................................................................................... 62
Figure 35: Advanced Wireless communication settings ....................................................................... 63
Figure 36: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 64
Figure 37: List of Available Firewall Rules .............................................................................................. 66
Figure 38: List of Available Schedules to bind to a firewall rule .......................................................... 67
Figure 39: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 70
Figure 40: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ................. 71
Figure 41: Schedule configuration for the above example. .................................................................. 75
Figure 42: List of user defined services. ................................................................................................. 77
Figure 43: Available ALG support on the router..................................................................................... 78
Figure 44: Passthrough options for VPN tunnels ................................................................................... 79
Figure 45: List of Available Application Rules showing 4 unique rules .............................................. 80
Figure 46: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ........................................................................................................... 81
Figure 47: Two trusted domains added to the Approved URLs List ................................................... 82
Figure 48: One keyword added to the block list ..................................................................................... 83
Figure 49: Export Approved URL list ....................................................................................................... 84
Figure 50: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured ................................................................................................................ 85
Figure 51: Intrusion Prevention features on the router ......................................................................... 86
Figure 52: Protecting the router and LAN from internet attacks .......................................................... 87
Figure 53: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet ............................................................................................................................ 88
Figure 54: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway .......................................................................................................................... 89
Figure 55: VPN Wizard launch screen .................................................................................................... 90
Figure 56: IPsec policy configuration ....................................................................................................... 93
Figure 57: IPsec policy configuration continued (Auto policy via IKE)................................................ 94
Figure 58: IPsec policy configuration continued (Auto / Manual Phase 2) ........................................ 95
Figure 59: PPTP tunnel configuration PPTP Client ............................................................................ 97
Figure 60: PPTP VPN connection status ................................................................................................ 97
Figure 61: PPTP tunnel configuration PPTP Server .......................................................................... 98
Figure 62: L2TP tunnel configuration L2TP Server ............................................................................ 99
Figure 63: OpenVPN configuration ........................................................................................................ 100