0

Out of 0 Ratings

Owner's of the D-Link Video Game Controller d-link wireless controller gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 181
 
Wireless Controller User Manual
3
4.4 Access Point status ................................................................................................ 64
4.5 Global Status ........................................................................................................... 69
4.6 Wireless Client Status ............................................................................................ 75
4.7 AP Management ..................................................................................................... 83
4.8 Associated Client Status/Statistics ....................................................................... 95
Chapter 5. Securing the Private Network ............................................................................................ 97
5.1 Firewall Rules .......................................................................................................... 97
5.2 Defining Rule Schedules ....................................................................................... 98
5.3 Configuring Firewall Rules ..................................................................................... 99
5.3.1 Firewall Rule Configuration Examples ............................................................... 103
5.4 Security on Custom Services .............................................................................. 107
5.5 ALG support ........................................................................................................... 107
5.6 VPN Passthrough for Firewall ............................................................................. 108
5.7 Application Rules .................................................................................................. 109
5.8 Web Content Filtering ........................................................................................... 110
5.8.1 Content Filtering .................................................................................................... 110
5.8.2 Approved URLs ..................................................................................................... 111
5.8.3 Blocked Keywords ................................................................................................ 112
5.8.4 Export Web Filter .................................................................................................. 113
5.9 IP/MAC Binding ..................................................................................................... 114
5.10 Protecting from Internet Attacks ......................................................................... 115
Chapter 6. IPsec / PPTP / L2TP VPN ................................................................................................ 117
6.1 VPN Wizard ........................................................................................................... 119
6.2 Configuring IPsec Policies ................................................................................... 121
6.2.1 Extended Authentication (XAUTH) ..................................................................... 124
6.2.2 Internet over IPSec tunnel ................................................................................... 124
6.3 Configuring VPN clients ....................................................................................... 125
6.4 PPTP / L2TP Tunnels ........................................................................................... 125
6.4.1 PPTP Tunnel Support .......................................................................................... 125
6.4.2 L2TP Tunnel Support ........................................................................................... 127
6.4.3 OpenVPN Support ................................................................................................ 128
Chapter 7. SSL VPN ............................................................................................................................. 131
7.1 Groups and Users ................................................................................................. 133
7.1.1 Users and Passwords .......................................................................................... 139
7.2 Using SSL VPN Policies ...................................................................................... 140
7.2.1 Using Network Resources ................................................................................... 143
7.3 Application Port Forwarding ................................................................................ 144
7.4 SSL VPN Client Configuration ............................................................................ 146
7.4.1 Creating Portal Layouts ....................................................................................... 148
Chapter 8. Advanced Configuration Tools ......................................................................................... 151
8.1 USB Device Setup ................................................................................................ 151
8.2 Authentication Certificates ................................................................................... 152
8.3 WIDS Security ....................................................................................................... 154