0

Out of 0 Ratings

Owner's of the D-Link Video Game Controller d-link wireless controller gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 181
 
Wireless Controller User Manual
7
Figure 67: Available ALG support on the controller. ............................................................................ 108
Figure 68: Passthrough options for VPN tunnels ................................................................................. 109
Figure 69: List of Available Application Rules showing 4 unique rules ............................................ 110
Figure 70: Content Filtering used to block access to proxy servers and prevent ActiveX controls
from being downloaded ......................................................................................................... 111
Figure 71: Two trusted domains added to the Approved URLs List ................................................. 112
Figure 72: One keyword added to the block list ................................................................................... 113
Figure 73: Export Approved URL list ..................................................................................................... 114
Figure 74: The following example binds a LAN host’s MAC Address to an IP address served by
DWC-1000. If there is an IP/MAC Binding violation, the violating packet will be dropped
and logs will be captured ...................................................................................................... 115
Figure 75: Protecting the controller and LAN from internet attacks .................................................. 116
Figure 76: Example of Gateway-to-Gateway IPsec VPN tunnel using two DWC controllers
connected to the Internet ...................................................................................................... 117
Figure 77: Example of three IPsec client connections to the internal network through the DWC
IPsec gateway ........................................................................................................................ 118
Figure 78: VPN Wizard launch screen .................................................................................................. 119
Figure 79: IPsec policy configuration ..................................................................................................... 122
Figure 80: IPsec policy configuration continued (Auto policy via IKE).............................................. 123
Figure 81: IPsec policy configuration continued (Auto / Manual Phase 2) ...................................... 124
Figure 82: PPTP tunnel configuration PPTP Client .......................................................................... 126
Figure 83: PPTP VPN connection status .............................................................................................. 126
Figure 84: PPTP tunnel configuration PPTP Server ........................................................................ 127
Figure 85: L2TP tunnel configuration L2TP Server .......................................................................... 128
Figure 86: OpenVPN configuration ........................................................................................................ 130
Figure 87: Example of clientless SSL VPN connections to the DWC-1000..................................... 132
Figure 88: List of groups .......................................................................................................................... 133
Figure 89: User group configuration ...................................................................................................... 134
Figure 90: SSLVPN Settings ................................................................................................................... 135
Figure 91: Group login policies options ................................................................................................. 136
Figure 92: Browser policies options ....................................................................................................... 137
Figure 93: IP policies options .................................................................................................................. 138
Figure 94: Available Users with login status and associated Group ................................................. 139
Figure 95: User configuration options .................................................................................................... 140
Figure 96: List of SSL VPN polices (Global filter) ................................................................................ 141
Figure 97: SSL VPN policy configuration .............................................................................................. 142
Figure 98: List of configured resources, which are available to assign to SSL VPN policies ....... 144