D-Link NetDefend DFL-210 User Manual page 10

Network security firewall ver. 1.05
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

List of Examples
1. Example notation ............................................................................................. xii
2.1. Enabling SSH Remote Access ..........................................................................12
2.2. Enabling remote management via HTTPS. ..........................................................14
2.3. Listing Configuration Objects ...........................................................................16
2.4. Displaying a Configuration Object .....................................................................16
2.5. Editing a Configuration Object .........................................................................17
2.6. Adding a Configuration Object .........................................................................17
2.7. Deleting a Configuration Object ........................................................................18
2.8. Undeleting a Configuration Object ....................................................................18
2.9. Listing Modified Configuration Objects ..............................................................19
2.10. Activating and Committing a Configuration .......................................................20
2.11. Enable Logging to a Syslog Host .....................................................................22
2.13. Configuration Backup and Restore ...................................................................28
3.1. Adding an IP Host ..........................................................................................32
3.2. Adding an IP Network .....................................................................................32
3.3. Adding an IP Range ........................................................................................32
3.4. Deleting an Address Object ..............................................................................33
3.5. Adding an Ethernet Address .............................................................................33
3.6. Listing the Available Services ...........................................................................35
3.7. Viewing a Specific Service ..............................................................................35
3.8. Adding a TCP/UDP Service .............................................................................37
3.9. Adding a IP Protocol Service ............................................................................39
3.10. Enabling DHCP ...........................................................................................42
3.11. Defining a virtual LAN ..................................................................................43
3.13. Creating an Interface Group ............................................................................45
3.14. Displaying the ARP Cache .............................................................................48
3.15. Flushing the ARP Cache ................................................................................48
3.16. Defining a Static ARP Entry ...........................................................................49
3.17. Setting up a Time-Scheduled Policy .................................................................55
3.18. Uploading an X.509 Certificate .......................................................................58
3.19. Setting the Current Date and Time ...................................................................59
3.20. Setting the Time Zone ...................................................................................60
3.21. Enabling DST ..............................................................................................60
3.22. Enabling Time Synchronization using SNTP ......................................................61
3.23. Manually Triggering a Time Synchronization ....................................................62
3.24. Modifying the Maximum Adjustment Value ......................................................62
3.25. Forcing Time Synchronization ........................................................................62
3.26. Enabling the D-Link NTP Server .....................................................................63
3.27. Configuring DNS Servers ...............................................................................64
4.1. Displaying the Routing Table ...........................................................................69
4.2. Displaying the Core Routes ..............................................................................70
4.3. Creating a Policy-Based Routing table ................................................................78
4.4. Creating the Route ..........................................................................................78
4.5. Policy Based Routing Configuration ..................................................................78
4.7. Exporting the Default Route into an OSPF AS .....................................................86
4.8. Setting up Transparent Mode - Scenario 1 ...........................................................90
4.9. Setting up Transparent Mode - Scenario 2 ...........................................................91
5.1. Setting up a DHCP server ................................................................................97
5.2. Checking the status of a DHCP server ................................................................98
5.3. Setting up Static DHCP ...................................................................................99
5.4. Setting up a DHCP relayer ............................................................................. 100
6.1. Setting up an Access Rule .............................................................................. 104
6.2. Protecting an FTP Server with ALG ................................................................. 106
6.3. Protecting FTP Clients .................................................................................. 109
6.4. Protecting Phones Behind D-Link Firewalls ...................................................... 113
x

Advertisement

Table of Contents
loading

Table of Contents