Download Print this page

D-Link DFL-M510 Faq page 7

Hide thumbs Also See for DFL-M510:

Advertisement

Deployment
Q: What is the difference between Bypass Mode and Bypass
feature (DMZ/Hosts)?
A:
The Bypass Mode is performed by the system software, so that the packet
information including protocol and throughput is still recorded by the device. On the
other side, the Bypass feature is implemented by the hardware engine, so that
although it's forwarding in wire-speed high performance, there will be no related
information left.
Q: How to implement the DFL-M510 in the environment with L3
device?
A:
We do not suggest a user to put any Layer 3 switch beneath the DFL-M510. Though
it will not suffer the security and control management, the host information of traffic
through the switch will be aggregated.
Q: On which occasions should I use the DMZ bypass or Host
bypass? Why?
A:
The DMZ is a trust area so that we do not have to check the traffic from this area
and the high throughput is desired. The same idea is also applied for hosts. A network
administrator can insert the DMZ servers into DMZ bypass list and host into host bypass
list for the wire-speed performance from DFL-M510. (But there is no log/report for the
bypassed traffic.)
Q: How does the DFL-M510 manage internal hosts in the DHCP
environment?
A:
The DFL-M510 identifies the internal hosts by their unique MAC addresses, so that
the device will provide the precise traffic information and management capability in
DHCP environments. When you enable the "MAC-Lock" feature in the host table, no
matter how the lP address change, it would bind to the same MAC address.
Q: How to deploy DFL-M510 in VLAN environment?
A:
In VLAN environment, the network administrator has to set up the supporting VLAN
Group IDs (up to 8) through the DFL-M510 console or UI.
D-Link Nordic Technical Support
7

Advertisement

loading