Network security firewall netdefendos version 2.40.00 (198 pages)
Summary of Contents for D-Link DFL-1000
Page 1
DFL-1000 Workgroup Firewall ’ User s Manual Rev. 02 (March, 2002) D-Link Systems, Inc. DFL-1000 User’s Manual...
Page 2
No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of D-Link Systems, Inc. DFL-1000 User’s Manual Version 2.2...
Configuring the DFL-1000 from the CLI ....................19 Connecting to the CLI......................... 20 Configuring the DFL-1000 to run in NAT mode.................. 20 Configuring the DFL-1000 to run in Transparent mode ..............21 Connecting the DFL-1000 to your network..................... 22 NAT mode connections ........................22 Transparent mode connections......................
Page 4
Adding traffic shaping to a policy......................45 VPN pass through........................... 46 Adding IPSec and PPTP pass through ....................46 IPSec VPNs ....................47 Compatibility with third-party VPN products ................... 47 Autokey IPSec VPN between two networks ................... 47 Creating the VPN tunnel........................48 DFL-1000 User’s Manual...
Page 5
Configuring the DFL-1000 as an L2TP server..................63 Configuring a Windows 2000 Client for L2TP ..................64 Configuring a Windows XP Client to connect to a DFL-1000 L2TP VPN .......... 65 RADIUS authentication for PPTP and L2TP VPNs ................66 Adding RADIUS server addresses .....................
Page 6
Downloading a log file to the management computer ................ 89 Deleting all of the messages in an active log ..................90 Deleting a saved log file ........................90 Administering the DFL-1000 ..............91 Logging into the web-based manager ....................91 System status ............................91 Changing the operating mode ......................
Page 7
Configuring SNMP..........................102 Using the DFL-1000 CLI.................104 Connecting to the DFL-1000 CLI......................104 Connecting to the DFL-1000 communications port................104 Connecting to the DFL-1000 CLI using SSH..................105 CLI basics ............................. 105 Recalling commands ........................105 Editing commands ..........................105 Using command shortcuts ........................
Introducing the DFL-1000 The DFL-1000 is one of a series of new generation all-layer security products that provide comprehensive protection for your internal network. These products, Application Security Gateways, combine key security technologies into a dedicated platform designed for high performance and reliability. In a compact, easy to install and configure package the DFL-1000 combines: •...
Network Address Translation (NAT) In NAT mode, the DFL-1000 is installed as a privacy barrier between the internal network and the Internet. The firewall provides network address translation to protect the private network. In NAT mode, you can add a DMZ network to provide public access to Internal servers while protecting them behind the firewall on a separate internal network.
Dynamic link libraries (dll) • MS Office files You can configure DFL-1000 virus scanning to block the target files or scan them for viruses and worms. You can configure three levels of virus protection: • High level protection removes target files from HTTP transfers and email attachments before they pass through the firewall With high level protection turned on, the DFL-1000 does not perform virus scanning.
Secure installation, configuration, and management Installation is quick and simple. All that is required to get the DFL-1000 up and running and protecting your network is to connect to the web-based manager and use the Quick Setup Wizard to configure the DFL-1000.
• Report configuration changes Logs can be sent to a remote syslog server or saved on an optional hard drive installed in the DFL-1000. About this document This user manual describes how to install and configure the DFL-1000. This document contains the following chapters: •...
Administering the DFL-1000 describes DFL-1000 management and administrative tasks • Using the DFL-1000 CLI introduces the DFL-1000 CLI and describes the basics of connecting to and using the CLI • Glossary defines many of the terms used in this document •...
Completing the configuration Before you start Before starting the installation of the DFL-1000, you must decide whether you are going to be running it in NAT mode or Transparent mode. This choice determines the information that you require to install the DFL-1000 as well as the installation steps that you perform.
Primary Secondary If you plan to use the DFL-1000 as a DHCP server to assign IP addresses to the computers on 5. DHCP Server your internal network, you must specify the IP address range reserved to be assigned by the (optional) DHCP server.
DFL-1000 package contents Mounting the DFL-1000 The DFL-1000 can be mounted on a standard 19-inch rack. It requires 1 U of vertical space in the rack. The DFL-1000 can be installed as a free-standing appliance on any stable surface. For free-standing installation, make sure the appliance has at least 1.5 in.
• Turn on the power switch. The DFL-1000 starts up. The Power and Status lights light. The Status light flashes while the DFL-1000 is starting up and remains lit when the system is up and running. Using the Quick Setup Wizard Use the procedures in this section to connect to the web-based manager and use the Quick Start Wizard to create your initial DFL-1000 configuration.
• Confirm your configuration settings and then click Finish and Close. You have now completed the initial configuration of the DFL-1000, and you can proceed to connect the DFL-1000 to your network using the information in Connecting the DFL-1000 to your network.
Configuring the DFL-1000 to run in Transparent mode. Configuring the DFL-1000 to run in NAT mode The procedures in this section describe how to use the CLI to configure the DFL-1000 to run in NAT mode. Configuring NAT mode IP addresses •...
DFL-1000 to your network using the information in Connecting the DFL-1000 to your network. Configuring the DFL-1000 to run in Transparent mode The procedures in this section describe how to use the CLI to configure the DFL-1000 to run in Transparent mode. Changing to Transparent mode •...
The CLI lists the IP address and netmask settings for each of the DFL-1000 interfaces. The address and netmask of the DMZ interface should be set to the Management IP Address and Netmask. Configure the Transparent mode default gateway •...
NAT mode connections: Transparent mode connections To connect the DFL-1000 running in Transparent mode: • Connect the Internal interface to the hub or switch connected to your internal network. • Connect the External Interface to the public switch or router provided by your Internet Service Provider.
DHCP. Use the internal address of the DFL-1000 as the DHCP server IP address. If you are running the DFL-1000 in Transparent mode, you do not have to make any changes to your network. Once the DFL-1000 is connected, make sure it is functioning properly by connecting to the internet from a computer on your internal network.
For effective scheduling and logging, the DFL-1000 date and time should be accurate. You can either manually set the DFL-1000 time or you can configure the DFL-1000 to automatically keep its time correct by synchronizing with a Network Time Protocol (NTP) server.
Accepting incoming connections in NAT mode The most secure way to operate an Internet server is to run the DFL-1000 in NAT mode and isolate the server on your DMZ network. Isolating the server on the DMZ is more secure because from there the server cannot be used to indirectly attack the internal network.
Add the Internal address of the server to the Internal address list. See Adding addresses. • Go to Firewall > Policy > Incoming . • Click New to add a new incoming policy. • Configure the policy. DFL-1000 User’s Manual...
Schedule Select a schedule to control when the policy denies connections. Service Select the service that matches the service of the policy to deny. Action Select Deny so that the DFL-1000 denies connections defined by the policy. DFL-1000 User’s Manual...
Controlling connections to the Internet By default, the DFL-1000 accepts all connections from the internal network to the Internet. If you do not want to enforce restrictions on access to the Internet, you do not have to change anything. The default policy accepts connections from any address on the internal network to any address on the Internet at any time, and for any service.
Optionally select Log Traffic to add messages to the traffic log whenever the policy accepts a Log Traffic connection. Traffic Optionally, select Traffic Shaping to control the bandwidth available to and set the priority of Shaping the traffic processed by the policy. • Click OK to save the policy. DFL-1000 User’s Manual...
• Configure the policy. Source Select the Internal address from which to accept connections. Destination Select the Internet address for which to accept connections. DFL-1000 User’s Manual...
Requiring authentication to connect to the Internet When running the DFL-1000 in NAT mode, you can configure policies to require users on the internal network to enter a user name and password to access the Internet. To require authentication you must...
Controlling connections to and from the DMZ By default the DFL-1000 firewall denies connections between the DMZ and the Internet and between the DMZ and the internal network. You can configure the firewall to accept, deny, or require authentication for connections between these networks by adding policies to the following policy lists: •...
The parts of a DFL-1000 policy Identifying information Source The IP address from which a user or service can connect to the firewall. Address Destination The location to which a user or service is attempting to connect when intercepted by the firewall.
POP3 to get email, use FTP to download files through the DFL-1000 and so on. If the default policy is at the top of the internal policy list, the DFL-1000 allows all connections from the internal network to the Internet because all connections match with the default policy.
Click the Internal, External, or DMZ tab corresponding to the type of address you want to edit. • Choose an address to edit and click Edit • Make the required changes and click OK to save your changes. DFL-1000 User’s Manual...
Use services to control the types of communication accepted or denied by the firewall. You can add any of the pre-configured services listed in DFL-1000 pre-defined services to a policy. You can also create your own custom services and add services to service groups.
Pre-defined services The DFL-1000 pre-defined services are listed in DFL-1000 pre-defined services. DFL-1000 pre-defined services Service Description Protocol, source and destination ports name Match connections on any port. tcp/53:0-65535 Domain name servers for looking up domain names. udp/53:0-65535 FINGER Finger service.
Members list. • To remove services from the service group, select a service from the Members list and click the left arrow to remove it from the group. 1. Click OK to add the service group. DFL-1000 User’s Manual...
Specify the Start date and time for the schedule. Set start and stop times to 00 for the schedule to cover the entire day. • Specify the Stop date and time for the schedule. One-time schedules use the 24-hour clock. DFL-1000 User’s Manual...
Select the days of the week that are working days. • Set the Start Hour and the End Hour to the start and end of the work day. The Recurring schedule uses a 24-hour clock. • Click OK. DFL-1000 User’s Manual...
Arranging a one-time schedule in the policy list to deny access: Users and authentication You can configure the DFL-1000 to require users to authenticate (enter a user name and password) to access services through the firewall. To configure authentication you need to add user names and passwords to the firewall and then add policies that require authentication.
Click New. • Enter a User Name and Password to add users to the DFL-1000. The password must be at least 6 characters long and may contain numbers (0-9) and upper and lower case letters (A-Z, a-z) but no spaces.
IP/MAC binding provides added security against IP Spoofing attacks. IP Spoofing attempts to use the IP address of a trusted computer to access the DFL-1000 from a different computer. The IP address of a computer can easily be changed to a trusted address, but MAC addresses are added to ethernet cards at the factory and cannot easily be changed.
Traffic Shaping makes it possible to control which policies have the highest priority when large amounts of data are moving through the DFL-1000. For example, the policy for the corporate web server might be given higher priority than the policies for most employees' computers. An employee who needs unusually high speed Internet access could have a special outgoing policy set up with higher bandwidth.
Internet. VPN pass through allows the VPN connection to pass-through your firewall and connect to the destination VPN. The DFL-1000 performs address translation on the connection, so that it seems to the target VPN gateway that the connection to its VPN is originating from the external interface of your DFL-1000.
Because the DFL-1000 supports the IPSec industry standard for VPN, you can configure a VPN between the DFL-1000 and any third party VPN client or gateway/firewall that supports IPSec VPN. To successfully establish the tunnel, the VPN settings must be the same on the DFL-1000 and the third party product.
Communication between the two networks takes place in an encrypted VPN tunnel that connects the two DFL-1000 VPN gateways across the Internet. Users on the internal networks are not aware that when they connect to a computer on the other network that the connection is across the Internet.
VPN in Example VPN between two internal networks. In the example, both IP addresses are for internal networks. IPSec Autokey VPN addresses Main Office (VPN Branch Office (VPN Description Gateway 1) Gateway 2) DFL-1000 User’s Manual...
Internet to the other VPN gateway using the VPN tunnel. Example IPSec Autokey VPN policy configuration Main Office (VPN Branch Office (VPN Description Gateway 1) Gateway 2) Source IP The Internal IP address (See IPSec Autokey Main_Office Branch_Office address addresses). DFL-1000 User’s Manual...
Communication between the remote users and the internal network takes place over an encrypted VPN tunnel that connects the remote user to the DFL-1000 VPN gateway across the Internet. Once connected to the VPN, the remote user's computer appears as if it is installed on the internal network.
To accept connections from a client at a static IP address (for example, 2.2.2.2). 2.2.2.2 Remote Gateway To accept connections from any Internet address (for a client with a dynamic IP 0.0.0.0 address). Keylife The amount of time (5 to 1440 minutes) before the encryption key expires. When 100 DFL-1000 User’s Manual...
Authentication Enter up to 20 characters. The VPN gateway and clients must have the same ddcHH01887d key. Complete the following procedure on the DFL-1000 VPN gateway. • Go to VPN > IPSEC > Autokey IKE . • Click New to add a new Autokey IKE VPN tunnel.
Manual key exchange IPSec VPN between two networks DFL-1000 IPSec VPNs can be configured to use Autokey IKE and manual key exchange. In most cases the Autokey key exchange is preferred because it is easier to configure and maintain. However, manual key exchange may be necessary in some cases for compatibility with third party VPN products.
Enter a hexadecimal number of up to eight digits (digits can be 0 to 9, a to f). This number must be Remote SPI added to the Local SPI at the opposite end of the tunnel. Remote Enter the external IP address of the DFL-1000 or other IPSec gateway at the opposite end of the Gateway tunnel. Encryption...
Communication between the remote users and the internal network takes place over an encrypted VPN tunnel that connects the remote user to the DFL-1000 VPN gateway across the Internet. Once connected to the VPN, the remote user's computer appears as if it is installed on the internal network.
The IPSec VPN tunnel starts automatically when the first data packet destined for the VPN is intercepted by the DFL-1000. To confirm that a VPN between a network and one or more clients has been configured correctly, start a VPN client and use the ping command to connect to a computer on the internal network.
RADIUS authentication for PPTP and L2TP VPNs PPTP VPN configuration This section describes how to configure the DFL-1000 as a PPTP VPN server. This section also describes how to configure Windows 98, Windows 2000, and Windows XP clients to connect to the PPTP VPN.
Configuring a Windows XP Client to connect to a DFL-1000 PPTP VPN Configuring the DFL-1000 as a PPTP server Use the following procedure to configure the DFL-1000 to be a PPTP server. • Go to VPN > PPTP > PPTP User .
Use the following procedure to configure a client machine running Windows 98 so that it can connect to a DFL-1000 PPTP VPN. To configure the Windows 98 client, you must install and configure windows dial- up networking and virtual private networking support.
• If the Public Network dialog box appears, choose the appropriate initial connection and click Next. • In the VPN Server Selection dialog, enter the external IP address or hostname of the DFL-1000 to connect to and click Next. •...
This user name and password is not the same as your VPN user name and password. L2TP VPN configuration This section describes how to configure the DFL-1000 as an L2TP VPN server. This section also describes how to configure Windows 2000 and Windows XP clients to connect to the L2TP VPN.
Configuring a Windows XP Client to connect to a DFL-1000 L2TP VPN Configuring the DFL-1000 as an L2TP server Use the following procedure to configure the DFL-1000 to be an L2TP server. • Go to VPN > L2TP > L2TP User .
For Network Connection Type, select Connect to a private network through the Internet and click Next. • For Destination Address, enter the external address of the DFL-1000 to connect to and click Next. • Set Connection Availability to Only for myself and click Next.
• If the Public Network dialog box appears, choose the appropriate initial connection and click Next. • In the VPN Server Selection dialog, enter the external IP address or hostname of the DFL-1000 to connect to and click Next. •...
This user name and password is not the same as your VPN user name and password. RADIUS authentication for PPTP and L2TP VPNs If you have RADIUS servers installed, you can configure the DFL-1000 to use RADIUS for authenticating PPTP and L2TP users. To configure RADIUS authentication you must add the IP addresses of your RADIUS servers to the DFL-1000 VPN configuration and then turn on RADIUS support for PPTP and L2TP.
If you have added PPTP and L2TP user names and passwords and configured RADIUS support, when a PPTP or L2TP user connects to a DFL-1000, their user name and password are checked against the DFL-1000 PPTP or L2TP user name and password list. If a match is not found, the DFL-1000 contacts the RADIUS server for authentication.
With attack prevention configured, the DFL-1000 monitors Internet connections for up to 11 common network attacks. If the DFL-1000 detects one of these attacks, it takes action to prevent the attack from affecting your Internet connection. All attacks are recorded in the attack log. You can also configure the DFL-1000 to send alert emails to system administrators if an attack is detected.
Make sure that the DNS server settings are correct for the DFL-1000. See Setting DNS server addresses. Because the DFL-1000 uses the SMTP server name to connect to the mail server, it must be able to look up this name on your DNS server. Example alert email settings: Testing email alerts You can test your email alert settings by sending a test email.
If the DFL-1000 detects a virus or worm in a file, the file is deleted from the data stream and replaced with an alert message. DFL-1000 content virus and worm prevention is transparent to the end user. Client and server programs require no special configuration and D-Link high performance hardware and software ensure there are no noticeable download delays.
You would not normally run the DFL-1000 with high level protection turned on. However, it is available for extremely high risk situations, where there is no other way to prevent viruses from entering your network.
High Security Alert!!! You are not allowed to download this type of file . Configuring medium level virus protection for your internal network Medium level protection scans all target files for viruses. You can configure the DFL-1000 to perform up to four different types of virus scans on each target file: •...
IMAP traffic. When the DFL-1000 detects a virus and removes the infected file, the user who requested the file receives a message similar to the following: Sorry, Dangerous Attachment has been removed.
Even though viruses and worms are distributed from your internal and DMZ networks by being uploaded through your firewall, an incoming connection to a server on your DMZ or internal network must first be started. It is this incoming connection that triggers DFL-1000 incoming virus protection. This section describes: •...
IMAP traffic originating from your internal or DMZ network. When the DFL-1000 blocks a file, the user who requested the file receives the following message: High Security Alert!!! You are not allowed to download this type of file .
IMAP traffic originating from your internal or DMZ network. When the DFL-1000 detects a virus and removes the infected file, the user who requested the file receives a message similar to the following: Sorry, Dangerous Attachment has been removed.
Configuring automatic antivirus database updates You can configure the DFL-1000 to automatically check an update center to see if a new version of the antivirus database is available. If it finds a new version the DFL-1000 automatically downloads and installs the updated database.
Scroll through the virus list to view the names of all of the viruses in the list. • Click Worm List to display the worm list. • Scroll through the worm list to view the names of all of the worms in the list. DFL-1000 User’s Manual...
Block web pages that contain content that you want to keep out of your internal network by enabling content blocking and then creating a list of banned words. With content blocking enabled and a list of banned words in place, the DFL-1000 blocks access to all web content that contains any of the banned words.
Creating the banned word list using a text editor You can create a list of banned words in a text editor and then upload this text file to the DFL-1000. •...
To block access to internet sites, you enable URL blocking and then create a list of URLs and URL patterns to be blocked. With URL blocking enabled and a list of URLs to be blocked, the DFL-1000 blocks access to all web pages with the specified URLs or URL patterns.
URLs from the URL block list. Creating the URL block list using a text editor You can create a URL block list in a text editor and then upload this text file to the DFL-1000. •...
Page 83
Example Script filtering settings to block Java Applets and ActiveX: DFL-1000 User’s Manual...
• Viewing and maintaining logs Configuring logging You can configure logging to record logs on a remote computer or on the DFL-1000. You can also configure the kind of information that is logged. • Recording logs on a remote computer •...
Go to Log&Report > Log setting . • Click Sent Alert Email to add an entry to the event log whenever the DFL-1000 sends an alert email. • Click Log All Internal Traffic To Firewall to record all connections to the internal interface.
Traffic log message format Traffic log messages record each connection made to a DFL-1000 interface. Each message records the date and time at which the connection was made, the source and destination address of the connection, and whether the connection was accepted or denied by the firewall.
When running in Transparent mode, the DFL-1000 does not create an Attack log. Attack log messages are created when the DFL-1000 detects one of the attacks listed on the IDS > Attack Prevention page. Attack log message format describes the attack log message format.
Sample Traffic log list: • To view the active log or a saved log file, click View • The web-based manager displays the messages in the selected log. Sample Event Log messages: DFL-1000 User’s Manual...
Downloading a log file to the management computer Use the following procedure to download a traffic, event, or attack log file to the management computer. • Go to Log&Report > Logging . DFL-1000 User’s Manual...
For each log, the list shows the date and time at which an entry was last added to the log, the size of the log file, and its name. • To delete a saved log file, click Delete • Click OK to delete the log file. DFL-1000 User’s Manual...
Make sure the computer from which you are going to connect to the web-based manager is correctly configured on the same network as the DFL-1000 interface to which you are going to connect. If the DFL-1000 is running in NAT mode, connect to the internal interface If the DFL-1000 is running in Transparent Mode, connect to the DMZ interface •...
• Shutting down the DFL-1000 • See System status monitor Changing the operating mode Use the following procedure to switch the operating mode of the DFL-1000 between NAT mode and Transparent mode. • Go to System > Status . •...
Use the following procedure to restore system settings to the values set at the factory. This procedure does not change the version of the Firmware or the Antivirus database. This procedure deletes all of the changes that you have made to the DFL-1000 and reverts the system to its original configuration including resetting interface addresses.
Page 94
Default NAT mode system configuration When the DFL-1000 is first powered up or when it is reset to default, the system has the following standard configuration: • Operation Mode: Network Address Translation • Internal Address: 192.168.1.99, mask 255.255.255.0 • External Address: 192.168.100.99, mask 255.255.255.0 •...
Click Shutdown. The DFL-1000 shuts down and all traffic flow through the firewall stops. The DFL-1000 can only be restarted after shutdown by turning the power off and on. System status monitor You can use the system status monitor to view system activity including the number of active connections to the DFL-1000 and information about the connections.
• Click DHCP and click OK. The DFL-1000 changes to DHCP mode and attempts to contact the DHCP server to set the external IP address, netmask, and default gateway IP address. When the DFL-1000 gets this information from the DHCP server, the new addresses and netmask are displayed in the external IP address, netmask, and default gateway IP address fields.
For example, the MTU of many PPP connections is 576, so if you connect to the Internet via PPP or PPPoE, you might want to set the MTU of the DFL-1000 to 576. DSL modems may also have small MTU sizes.
If there are multiple routers installed on your network, you can configure static routes to determine the path that data follows over your network before and after it passes through the DFL-1000. You can also use static routing to allow different IP domain users to access the Internet through the DFL-1000.
Providing DHCP services to your internal network If it is operating in NAT mode, you can configure the DFL-1000 to be the DHCP server for your internal network. • Go to System > Network > DNS . • If they have not already been added, add the primary and secondary DNS server addresses provided to you by your ISP.
• Select your Time Zone from the list. • Optionally, click Set Time and set the DFL-1000 date and time to the correct date and time. • To configure the DFL-1000 to use NTP, click Synchronize with NTP server. •...
The appearance of the web-based manager changes. Adding and editing administrator accounts When the DFL-1000 is initially installed, it is configured with a single administrator account. This administrator has permission to change all DFL-1000 settings. From the web-based manager, you can add administrator accounts and control their level of administrative access.
To delete an administrator account, choose the account to delete and click Delete Configuring SNMP Configure SNMP for the DFL-1000 so that the SNMP agent running on the DFL-1000 can report system information and send traps. Traps can alert system administrators about problems with the DFL-1000.
Page 103
Optionally specify the IP address of a second SNMP monitor to which to send traps. Address Third Trap Receiver IP Optionally specify the IP address of a third SNMP monitor to which to send traps. Address • Click Apply. Sample SNMP configuration: DFL-1000 User’s Manual...
This chapter explains how to connect to the DFL-1000 CLI and also describes some of the basics of using the CLI. You can use CLI commands to view all system information and to change all system configuration settings.
Type the password for this administrator and press Enter. The following prompt appears: Type ? for a list of commands. You have connected to the DFL-1000 CLI, and you can proceed to enter CLI commands as if you have connected through the DFL-1000 communications port. CLI basics This section describes the basics of using the DFL-1000 CLI to enter commands.
DFL-1000. This procedure deletes all of the changes that you have made to the DFL-1000 configuration and reverts the system to its default configuration, including resetting interface addresses. Before installing new firmware make...
Page 107
Make sure the Internal interface of the DFL-1000 is connected to your internal network. • To confirm that you can connect to the TFTP server from the DFL-1000, start the DFL-1000 CLI and use the following command to ping the computer running the TFTP server. If the TFTP server's IP address is 192.168.100.101:...
Page 108
Once the interface addresses are changed you can access the DFL-1000 from the web-based manager and upload your configuration files. DFL-1000 User’s Manual...
(private) network. Typically, the DMZ contains servers accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. DMZ interface : The DFL-1000 interface that is connected to your servers that are accessible from the Internet.
Page 110
Routing : The process of determining a path to use to send data to its destination. Routing table : A list of valid paths through which data can be transmitted. SCCU , Security and Content Control Units : D-Link products that provide high-performance, hardware-based protection against content-based security threats, such as viruses and worms, combined with firewall, VPN, intrusion detection, content filtering, and traffic shaping.
Page 111
Worm : A program or algorithm that replicates itself over a computer network, usually through email, and performs malicious actions, such as using up the computer's resources and possibly shutting the system down. DFL-1000 User’s Manual...
This most often occurs when adding a single address and forgetting to change the netmask from 255.255.255.0 to 255.255.255.255. Q: My policies are set correctly but I still cannot connect to the Internet from one or more of the computers on my internal network. DFL-1000 User’s Manual...
Check the default gateway setting on that particular computer. Its default gateway must match the internal address of the DFL-1000. Q: I checked the default gateway and it matches but I still cannot connect to the Internet. Make sure that the external address and external gateway of the firewall have been properly set to your Internet Service Provider's (ISP) specifications.
Internet, and most can be very easily set up. In some cases a more advanced commercial version is available for a modest fee. • If you are running the DFL-1000 in NAT mode, the computer running the syslog server must be connected to the same network as the Internal interface of the DFL-1000 DFL-1000 User’s Manual...
Page 115
• If you are running the DFL-1000 in Transparent mode, the computer running the syslog server must be connected to the same network as the DMZ interface of the DFL-1000 DFL-1000 User’s Manual...
Le Florilege #2, Allee de la Fresnerie, 78330 Fontenay le Fleury France TEL: 33-1-302-38688 FAX: 33-1-3023-8689 E-MAIL: info@dlink-france.fr URL: www.dlink-france.fr GERMANY D-LINK Central Europe/D-Link Deutschland GmbH Schwalbacher Strasse 74, D-65760 Eschborn, Germany TEL: 49-6196-77990 FAX: 49-6196-7799300 INFO LINE: 00800-7250-0000 (toll free) HELP LINE: 00800-7250-4000 (toll free)
Page 117
8. What category best describes your company? Aerospace Engineering Education Finance Hospital Legal Insurance/Real Estate Manufacturing Retail/Chainstore/Wholesale Government Transportation/Utilities/Communication System house/company Other________________________________ 9. Would you recommend your D-Link product to a friend? Don't know yet 10.Your comments on this product? __________________________________________________________________________________________ __________________________________________________________________________________________ DFL-1000 User’s Manual...