Business Security Gateway
3.1.4.4 6 to 4.............................................................................................................................................59
3.1.4.5 IPv6 in IPv4 Tunnel.......................................................................................................................60
3.1.5 NAT Setup............................................................................................................................... 61
3.1.5.1 Virtual Server ................................................................................................................................61
3.1.5.2 Virtual Computers .........................................................................................................................62
3.1.5.3 Special AP ....................................................................................................................................62
3.1.5.4NAT Loopback ..............................................................................................................................63
3.1.5.5 DMZ..............................................................................................................................................64
3.1.6 Routing Setup.......................................................................................................................... 65
3.1.6.1 Static Routing................................................................................................................................65
3.1.6.2 Dynamic Routing...........................................................................................................................66
3.1.6.3 Routing Information.......................................................................................................................68
3.1.7 Client/Server/Proxy ................................................................................................................. 69
3.1.7.1 Dynamic DNS ...............................................................................................................................69
3.2 ADVANCED NETWORK.................................................................................................................................71
3.2.1 Firewall.................................................................................................................................... 71
3.2.1.1 Packet Filters ................................................................................................................................71
3.2.1.2 URL Blocking................................................................................................................................73
3.2.1.3 Web Content Filter........................................................................................................................75
3.2.1.4 MAC Control .................................................................................................................................76
3.2.1.5 L7 Filter.........................................................................................................................................77
3.2.1.6 Access Control..............................................................................................................................78
3.2.1.7 IPS................................................................................................................................................78
3.2.1.8 Others ...........................................................................................................................................79
3.2.2 QoS (Quality of Service).......................................................................................................... 80
3.2.2.1 QoS Configuration ........................................................................................................................80
3.2.2.2 Rule-based QoS ...........................................................................................................................81
3.2.2.2.1 Creating a QoS Rule based on IP Grouping .............................................................................................82
3.2.2.2.2 Creating a QoS Rule based on MAC Grouping........................................................................................86
3.2.3 VPN Setup............................................................................................................................... 88
3.2.3.1 IPSec ............................................................................................................................................88
3.2.3.1.1 IPSec VPN Tunnel Scenarios...................................................................................................................88
3.2.3.1.2 IPSec Configuration.................................................................................................................................90
3.2.3.1.3 Tunnel List & Status.................................................................................................................................91
3.2.3.1.4 Tunnel Configuration ...............................................................................................................................91
3.2.3.1.5 Local & Remote Configuration................................................................................................................92
3.2.3.1.6 Authentication..........................................................................................................................................92
3.2.3.1.7 IKE Phase.................................................................................................................................................93
3.2.3.1.8 IKE Proposal Definition...........................................................................................................................94
BDE702 / BDE761 / BDE771 User Manual 3