D-Link DFL-1100 Manual
Total Page:16
File Type:pdf, Size:1020Kb
D-Link DFL-1100 Network Security Firewall Manual Building Networks for People Ver. 1.01 2005/01/14 Contents Introduction ....................................................................................7 Features and Benefits ........................................................................... 7 Introduction to Firewalls ........................................................................ 7 Introduction to Local Area Networking .................................................. 8 LEDs & Physical Connections............................................................... 9 Package Contents............................................................................... 10 System Requirements......................................................................... 10 Managing D-Link DFL-1100 ......................................................... 11 Resetting the DFL1100 ...............................................................................11 Administration Settings...............................................................12 Administrative Access ......................................................................... 12 Add ping access to an interface..................................................................13 Add Admin access to an interface...............................................................13 Add Read-only access to an interface ........................................................14 Enable SNMP access to an interface .........................................................14 System ..........................................................................................15 Interfaces ............................................................................................ 15 Change IP of the LAN, DMZ or ETH4 interface..........................................15 WAN Interface Settings – Using Static IP ...................................................16 WAN Interface Settings – Using DHCP ......................................................16 WAN Interface Settings – Using PPPoE.....................................................17 WAN Interface Settings – Using PPTP .......................................................18 WAN Interface Settings – Using BigPond...................................................19 Traffic Shaping ............................................................................................19 MTU Configuration......................................................................................20 VLAN................................................................................................... 21 Add a new VLAN.........................................................................................21 Remove a VLAN .........................................................................................21 Routing................................................................................................ 22 Add a new Static Route...............................................................................23 Remove a Static Route ...............................................................................23 High Availability ................................................................................... 24 What High Availability will do for you ..........................................................24 What High Availability will NOT do for you..................................................24 IP Addresses explained ..............................................................................25 2 The shared IP address and the failover mechanism ..................................25 Cluster heartbeats.......................................................................................26 The synchronization interface.....................................................................26 Setting up a High Availability cluster...........................................................27 Interface Monitoring ....................................................................................28 Logging ............................................................................................... 29 Enable Logging ...........................................................................................30 Enable Audit Logging ..................................................................................30 Enable E-mail alerting for ISD/IDP events ..................................................30 Time .................................................................................................... 32 Changing time zone ....................................................................................33 Using NTP to sync time...............................................................................33 Setting time and date manually...................................................................33 Firewall..........................................................................................34 Policy................................................................................................... 34 Policy modes...............................................................................................34 Action Types................................................................................................34 Source and Destination Filter......................................................................35 Service Filter ...............................................................................................35 Schedule .....................................................................................................35 Intrusion Detection / Prevention..................................................................35 Traffic Shaping ............................................................................................36 Policy Routing .............................................................................................36 Add a new policy.........................................................................................38 Change order of policy................................................................................39 Delete policy................................................................................................39 Configure Intrusion Detection .....................................................................39 Configure Intrusion Prevention ...................................................................40 Port mapping / Virtual Servers ............................................................ 41 Add a new mapping ....................................................................................41 Delete mapping...........................................................................................42 Administrative users............................................................................ 43 Add Administrative User..............................................................................43 Change Administrative User Access level ..................................................44 Change Administrative User Password.......................................................44 Delete Administrative User..........................................................................45 Users................................................................................................... 46 The DFL-1100 RADIUS Support.................................................................46 Enable User Authentication via HTTP / HTTPS..........................................47 Enable RADIUS Support.............................................................................47 Add User .....................................................................................................48 Change User Password ..............................................................................48 Delete User .................................................................................................49 Schedules ........................................................................................... 50 Add new recurring schedule .......................................................................50 Services .............................................................................................. 51 Adding TCP, UDP or TCP/UDP Service......................................................51 Adding IP Protocol ......................................................................................52 Grouping Services ......................................................................................52 Protocol-independent settings ....................................................................53 VPN..................................................................................................... 54 Introduction to IPSec...................................................................................54 Introduction to PPTP...................................................................................55 Introduction to L2TP....................................................................................55 Point-to-Point Protocol ................................................................................55 Authentication Protocols .............................................................................56 PAP...............................................................................................................56 CHAP............................................................................................................56