User`s manual

Adding an IPSec VPN policy .................................................................................................................... 49
Configuring the IPSec VPN client............................................................................................................. 50
Manual key exchange IPSec VPN between two networks ........................................................................... 50
Configuring the VPN tunnel ...................................................................................................................... 50
Adding internal and external addresses ................................................................................................... 51
Adding an IPSec VPN policy .................................................................................................................... 52
Manual key exchange IPSec VPN for remote clients ................................................................................... 52
Configuring the VPN tunnel ...................................................................................................................... 52
Adding internal and external addresses ................................................................................................... 52
Adding an IPSec VPN policy .................................................................................................................... 52
Testing a VPN............................................................................................................................................... 53
IPSec VPN pass through .............................................................................................................................. 53
IPSec client to network VPN pass through............................................................................................... 53
IPSec network to network VPN pass through........................................................................................... 54
PPTP and L2TP VPNs .................................................................................. 56
PPTP VPN configuration............................................................................................................................... 56
Configuring the DFL-500 as a PPTP server ............................................................................................. 57
Configuring a Windows 98 client for PPTP............................................................................................... 58
Configuring a Windows 2000 Client for PPTP.......................................................................................... 59
Configuring a Windows XP Client to connect to a DFL-500 PPTP VPN .................................................. 59
PPTP VPN pass through .............................................................................................................................. 60
PPTP client to network VPN pass through ............................................................................................... 61
L2TP VPN configuration ............................................................................................................................... 62
Configuring the DFL-500 as an L2TP server............................................................................................ 62
Configuring a Windows 2000 Client for L2TP........................................................................................... 63
Configuring a Windows XP Client to connect to a DFL-500 L2TP VPN................................................... 64
RADIUS authentication for PPTP and L2TP VPNs ...................................................................................... 66
Adding RADIUS server addresses ........................................................................................................... 66
Turning on RADIUS authentication for PPTP........................................................................................... 67
Turning on RADIUS authentication for L2TP............................................................................................ 67
Intrusion detection system (IDS) ................................................................ 68
Attack prevention .......................................................................................................................................... 68
Alert email ..................................................................................................................................................... 68
Configuring alert email.............................................................................................................................. 69
Testing email alerts................................................................................................................................... 69
Virus protection............................................................................................ 70
Virus protection for your internal network ..................................................................................................... 70
High level virus protection for your internal network................................................................................. 71
Medium level virus protection for your internal network ........................................................................... 72
Low level virus protection for your internal network.................................................................................. 73
Virus protection for incoming connections .................................................................................................... 73
High level virus protection for incoming connections................................................................................ 74
DFL-500 User’s Manual
5