User's Manual

Unified Services Router User Manual
7
Figure 33: OSPFv2 configured parameters ............................................................................................ 59
Figure 34: OSPFv2 configuration ............................................................................................................. 60
Figure 35: OSPFv3 configured parameters ............................................................................................ 61
Figure 36: OSPFv3 configuration ............................................................................................................. 62
Figure 37: 6 to 4 tunneling ......................................................................................................................... 63
Figure 38: ISATAP Tunnels Configuration .............................................................................................. 64
Figure 39: WAN3 configuration for 3G internet ...................................................................................... 66
Figure 40: Physical WAN port settings .................................................................................................... 67
Figure 41: Wireless Network Setup Wizards .......................................................................................... 69
Figure 42: List of Available Profiles shows the options available to secure the wireless link ......... 71
Figure 43: Profile configuration to set network security ........................................................................ 73
Figure 44: RADIUS server (External Authentication) configuration .................................................... 75
Figure 45: Virtual AP configuration .......................................................................................................... 76
Figure 46: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 77
Figure 47: Radio card configuration options ........................................................................................... 78
Figure 48: Wi-Fi Multimedia ...................................................................................................................... 79
Figure 49: Wireless Distribution System ................................................................................................. 80
Figure 50: Advanced Wireless communication settings ....................................................................... 82
Figure 51: WPS configuration for an AP with WPA/WPA2 profile ....................................................... 83
Figure 52: List of Available Firewall Rules .............................................................................................. 86
Figure 53: List of Available Schedules to bind to a firewall rule .......................................................... 87
Figure 54: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ........................................ 90
Figure 55: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ................. 91
Figure 56: The IPv6 firewall rule configuration page allows you to define the To/From zone,
service, action, schedules, and specify source/destination IP addresses as needed. .. 92
Figure 57: List of Available IPv6 Firewall Rules ..................................................................................... 93
Figure 58: Schedule configuration for the above example. .................................................................. 96
Figure 59: List of user defined services. ................................................................................................. 98
Figure 60: Custom Services configuration .............................................................................................. 98
Figure 61: Available ALG support on the router................................................................................... 100
Figure 62: Passthrough options for VPN tunnels ................................................................................. 101
Figure 63: List of Available Application Rules showing 4 unique rules ............................................ 102
Figure 64: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ......................................................................................................... 103