User's Manual
Table Of Contents
Unified Services Router User Manual
3
Chapter 4. Wireless Access Point Setup ............................................................................................. 68
4.1 Wireless Settings Wizard ....................................................................................... 68
4.1.1 Wireless Network Setup Wizard ........................................................................... 69
4.1.2 Add Wireless Device with WPS ............................................................................ 69
4.1.3 Manual Wireless Network Setup .......................................................................... 70
4.2 Wireless Profiles ..................................................................................................... 70
4.2.1 WEP Security .......................................................................................................... 71
4.2.2 WPA or WPA2 with PSK ........................................................................................ 73
4.2.3 RADIUS Authentication .......................................................................................... 73
4.3 Creating and Using Access Points ....................................................................... 75
4.3.1 Primary benefits of Virtual APs: ............................................................................ 77
4.4 Tuning Radio Specific Settings ............................................................................. 78
4.5 WMM ......................................................................................................................... 79
4.6 Wireless distribution system (WDS) ..................................................................... 80
4.7 Advanced Wireless Settings.................................................................................. 81
4.8 Wi-Fi Protected Setup (WPS) ............................................................................... 82
Chapter 5. Securing the Private Network ............................................................................................ 85
5.1 Firewall Rules .......................................................................................................... 85
5.2 Defining Rule Schedules ....................................................................................... 86
5.3 Configuring Firewall Rules ..................................................................................... 87
5.4 Configuring IPv6 Firewall Rules ............................................................................ 92
5.4.1 Firewall Rule Configuration Examples ................................................................. 93
5.5 Security on Custom Services ................................................................................ 97
5.6 ALG support ............................................................................................................. 99
5.7 VPN Passthrough for Firewall ............................................................................. 100
5.8 Application Rules .................................................................................................. 101
5.9 Web Content Filtering ........................................................................................... 102
5.9.1 Content Filtering .................................................................................................... 102
5.9.2 Approved URLs ..................................................................................................... 103
5.9.3 Blocked Keywords ................................................................................................ 104
5.9.4 Export Web Filter .................................................................................................. 105
5.10 IP/MAC Binding ..................................................................................................... 106
5.11 Intrusion Prevention (IPS).................................................................................... 107
5.12 Protecting from Internet Attacks ......................................................................... 108
Chapter 6. IPsec / PPTP / L2TP VPN ................................................................................................ 111
6.1 VPN Wizard ........................................................................................................... 113
6.2 Configuring IPsec Policies ................................................................................... 115
6.2.1 Extended Authentication (XAUTH) ..................................................................... 119
6.2.2 Internet over IPSec tunnel ................................................................................... 120
6.3 Configuring VPN clients ....................................................................................... 120
6.4 PPTP / L2TP Tunnels ........................................................................................... 120
6.4.1 PPTP Tunnel Support .......................................................................................... 120
6.4.2 L2TP Tunnel Support ........................................................................................... 122
6.4.3 OpenVPN Support ................................................................................................ 123
6.4.4 OpenVPN Remote Network ................................................................................ 125
6.4.5 OpenVPN Authentication ..................................................................................... 126