Firewall..............................................................................................25
Policy................................................................................................... 25
Policy modes...............................................................................................25
Action Types................................................................................................25
Source and Destination Filter......................................................................25
Service Filter...............................................................................................26
Schedule.....................................................................................................26
Intrusion Detection / Prevention..................................................................26
Add a new policy.........................................................................................28
Change order of policy................................................................................29
Delete policy................................................................................................29
Configure Intrusion Detection .....................................................................29
Configure Intrusion Prevention...................................................................30
Port mapping / Virtual Servers ............................................................ 31
Add a new mapping....................................................................................31
Delete mapping...........................................................................................32
Administrative user.............................................................................. 33
Change Administrative User Password.......................................................33
Users................................................................................................... 34
The DFL-200 RADIUS Support...................................................................34
Enable UserAuthentication via HTTP / HTTPS..........................................35
Enable RADIUS Support.............................................................................35
Add User.....................................................................................................36
Change User Password..............................................................................36
Delete User.................................................................................................37
Schedules ........................................................................................... 38
Add new recurring schedule .......................................................................38
Add new one-time schedule........................................................................39
Services .............................................................................................. 40
Adding TCP, UDP or TCP/UDP Service......................................................40
Adding IP Protocol ......................................................................................41
Grouping Services ......................................................................................41
Protocol-independent settings ....................................................................42
VPN..................................................................................................... 43
IPSec VPN between two networks .............................................................44
Creating a LAN-to-LAN VPN Tunnel...........................................................44
IPSec VPN between client and an internal network ...................................45
Creating a Roaming Users Tunnel..............................................................45
VPN – Advanced Settings................................................................... 46
Limit MTU....................................................................................................46
IKE Mode ....................................................................................................46
IKE DH Group.............................................................................................46
PFS – Perfect Forward Secrecy .................................................................46
NAT Traversal .............................................................................................46
Keepalives...................................................................................................46
Proposal Lists..............................................................................................47