Vigor2926 Series User’s Guide
i
V-1-2 VPN Server Wizard........................................................................................................ 326
V-1-3 Remote Access Control ................................................................................................. 330
V-1-4 PPP General Setup........................................................................................................ 331
V-1-5 IPsec General Setup...................................................................................................... 333
V-1-6 IPsec Peer Identity......................................................................................................... 334
V-1-7 OpenVPN....................................................................................................................... 337
V-1-7-1 General Setup .......................................................................... 337
V-1-7-2 Client Config............................................................................ 338
V-1-8 Remote Dial-in User....................................................................................................... 340
V-1-9 LAN to LAN .................................................................................................................... 343
V-1-10 VPN Trunk Management ............................................................................................. 354
V-1-11 Connection Management............................................................................................. 363
Application Notes..................................................................................................................... 365
A-1 How to Build a LAN-to-LAN VPN Between Vigor Routers via IPsec Main Mode ... 365
A-2 How to Build a LAN-to-LAN VPN Between Vigor Routers via IKEv2................. 370
V-2 SSL VPN.................................................................................................................................. 373
Web User Interface.................................................................................................................. 374
V-2-1 General Setup................................................................................................................ 374
V-2-2 User Account.................................................................................................................. 375
V-2-3 User Group..................................................................................................................... 379
V-2-6 Online User Status......................................................................................................... 381
V-3 Certificate Management........................................................................................................... 382
Web User Interface.................................................................................................................. 383
V-3-1 Local Certificate ............................................................................................................. 383
V-3-2 Trusted CA Certificate.................................................................................................... 387
V-3-3 Certificate Backup.......................................................................................................... 389
Part VI Security ..............................................................................................................391
VI-1 Firewall ................................................................................................................................... 392
Web User Interface.................................................................................................................. 394
VI-1-1 General Setup............................................................................................................... 394
VI-1-2 Filter Setup.................................................................................................................... 399
VI-1-3 Defense Setup .............................................................................................................. 409
VI-1-3-1 DoS Defense............................................................................ 409
VI-1-3-2 Spoofing Defense...................................................................... 412
VI-1-4 Diagnose....................................................................................................................... 412
Application Notes..................................................................................................................... 415
A-1 How to Configure Certain Computers Accessing to Internet ........................ 415
VI-2 Central Security Management (CSM) .................................................................................... 419
Web User Interface.................................................................................................................. 420
VI-2-1 APP Enforcement Profile .............................................................................................. 420
VI-2-2 APPE Signature Upgrade ............................................................................................. 422
VI-2-3 URL Content Filter Profile ............................................................................................. 424