User's Manual

Unified Services Router User Manual
8
Figure 65: Two trusted domains added to the Approved URLs List ................................................. 104
Figure 66: One keyword added to the block list ................................................................................... 105
Figure 67: Export Approved URL list ..................................................................................................... 106
Figure 68: The following example binds a LAN host’s MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be captured .............................................................................................................. 107
Figure 69: Intrusion Prevention features on the router ....................................................................... 108
Figure 70: Protecting the router and LAN from internet attacks ........................................................ 109
Figure 71: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet .......................................................................................................................... 111
Figure 72: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway ........................................................................................................................ 112
Figure 73: VPN Wizard launch screen .................................................................................................. 113
Figure 74: IPsec policy configuration ..................................................................................................... 116
Figure 75: IPsec policy configuration continued (Auto policy via IKE).............................................. 117
Figure 76: IPsec policy configuration continued (Auto / Manual Phase 2) ...................................... 119
Figure 77: PPTP tunnel configuration PPTP Client .......................................................................... 121
Figure 78: PPTP VPN connection status .............................................................................................. 121
Figure 79: PPTP tunnel configuration PPTP Server ........................................................................ 122
Figure 80: L2TP tunnel configuration L2TP Server .......................................................................... 123
Figure 81: OpenVPN configuration ........................................................................................................ 125
Figure 82: OpenVPN Remote Network ................................................................................................. 126
Figure 83: OpenVPN Authentication ...................................................................................................... 127
Figure 84: Example of clientless SSL VPN connections to the DSR ................................................ 130
Figure 85: List of groups .......................................................................................................................... 131
Figure 86: User group configuration ...................................................................................................... 132
Figure 87: SSLVPN Settings ................................................................................................................... 133
Figure 88: Group login policies options ................................................................................................. 134
Figure 89: Browser policies options ....................................................................................................... 135
Figure 90: IP policies options .................................................................................................................. 136
Figure 91: Available Users with login status and associated Group ................................................. 137
Figure 92: User configuration options .................................................................................................... 138
Figure 93: List of SSL VPN polices (Global filter) ................................................................................ 139
Figure 94: SSL VPN policy configuration .............................................................................................. 140
Figure 95: List of configured resources, which are available to assign to SSL VPN policies ....... 142
Figure 96: List of Available Applications for SSL Port Forwarding .................................................... 144
Figure 97: SSL VPN client adapter and access configuration ........................................................... 145