
Unified Services Router User Manual
3
Chapter 4. Wireless Access Point Setup........................................................................................................68
4.1 Wireless Settings Wizard.................................................................................................68
4.1.1 Wireless Network Setup Wizard....................................................................................69
4.1.2 Add Wireless Device with WPS .....................................................................................69
4.1.3 Manual Wireless Network Setup ...................................................................................70
4.2 Wireless Profiles..................................................................................................................70
4.2.1 WEP Security.......................................................................................................................71
4.2.2 WPA or WPA2 with PSK..................................................................................................73
4.2.3 RADIUS Authentication ....................................................................................................73
4.3 Creating and Using Access Points ...............................................................................75
4.3.1 Primary benefits of Virtual APs:.....................................................................................77
4.4 Tuning Radio Specific Settings ......................................................................................78
4.5 WMM.......................................................................................................................................79
4.6 Wireless distribution system (WDS)............................................................................. 80
4.7 Advanced Wireless Settings ...........................................................................................81
4.8 Wi-Fi Protected Setup (WPS).........................................................................................82
Chapter 5. Securing the Private Network .......................................................................................................85
5.1 Firewall Rules.......................................................................................................................85
5.2 Defining Rule Schedules ..................................................................................................86
5.3 Configuring Firewall Rules...............................................................................................87
5.4 Configuring IPv6 Firewall Rules.....................................................................................92
5.4.1 Firewall Rule Configuration Examples.........................................................................93
5.5 Security on Custom Services.......................................................................................... 97
5.6 ALG support..........................................................................................................................99
5.7 VPN Passthrough for Firewall ...................................................................................... 100
5.8 Application Rules ..............................................................................................................101
5.9 Web Content Filtering......................................................................................................102
5.9.1 Content Filtering................................................................................................................102
5.9.2 Approved URLs .................................................................................................................103
5.9.3 Blocked Keywords ............................................................................................................104
5.9.4 Export Web Filter ..............................................................................................................105
5.10 IP/MAC Binding .................................................................................................................106
5.11 Intrusion Prevention (IPS)..............................................................................................107
5.12 Protecting from Internet Attacks..................................................................................108
Chapter 6. IPsec / PPTP / L2TP VPN............................................................................................................111
6.1 VPN Wizard ........................................................................................................................113
6.2 Configuring IPsec Policies.............................................................................................115
6.2.1 Extended Authentication (XAUTH) .............................................................................119
6.2.2 Internet over IPSec tunnel .............................................................................................120
6.3 Configuring VPN clients..................................................................................................120
6.4 PPTP / L2TP Tunnels......................................................................................................120
6.4.1 PPTP Tunnel Support .....................................................................................................120
6.4.2 L2TP Tunnel Support ......................................................................................................122
6.4.3 OpenVPN Support............................................................................................................123
6.4.4 OpenVPN Remote Network ..........................................................................................125
6.4.5 OpenVPN Authentication ...............................................................................................126