Page 1
D-Link DFL-1000 Network Security Firewall Manual Building Networks for People DFL-1000 User Manual...
Page 2
No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of D-Link Systems, Inc. DFL-1000 User Manual Version 2.36...
Starting the setup wizard ........................23 Reconnecting to the web-based manager..................23 Using the command line interface ......................24 Configuring the DFL-1000 NPG to run in NAT/Route mode .............. 24 Connecting to your networks ........................25 Configuring your networks ........................25 Completing the configuration........................
Page 4
Adding a schedule to a policy......................46 Virtual IPs ............................... 47 Adding static NAT virtual IPs ......................47 Adding port forwarding virtual IPs ...................... 49 Adding policies with virtual IPs ......................50 IP pools ..............................51 IP/MAC binding............................52 DFL-1000 User Manual...
Page 5
About dialup VPN authentication......................73 About DH groups ..........................75 About the P1 proposal ........................75 About NAT traversal ........................... 75 Adding an AutoIKE key VPN tunnel ....................... 76 About the P2 proposal ........................77 About replay detection........................77 DFL-1000 User Manual...
Page 6
Hub and spoke VPN (VPN concentrator) ....................97 Configuring the hub ..........................98 Configuring the spokes........................98 Configuring the remote gateways....................... 99 Configuring the AutoIKE key tunnels....................99 Configuring the VPN concentrator....................100 Adding source and destination addresses ..................100 DFL-1000 User Manual...
Page 7
Adding encrypt policies........................101 PPTP and L2TP VPNs ................103 PPTP VPN configuration ........................103 Configuring the DFL-1000 NPG as a PPTP gateway ..............104 Configuring a Windows 98 client for PPTP ..................105 Configuring a Windows 2000 client for PPTP .................. 106 Configuring a Windows XP client for PPTP..................
Page 8
Recording logs on the DFL-1000 hard disk..................124 Logging event log to memory ......................125 Selecting what to log ........................125 Viewing event log saved to memory..................... 126 Viewing event log ..........................126 Searching event log.......................... 126 Clearing event log messages ......................127 Viewing and maintaining logs saved to the hard disk................
Page 9
Enabling RIP server support......................146 Adding routes (Transparent mode) ....................146 Configuring the DFL-1000 NPG for multiple Internet connections........... 146 Providing DHCP services to your internal network................148 System configuration ..........................150 Setting system date and time ......................150 Changing web-based manager options.................... 151 Adding and editing administrator accounts ..................152...
If a match is found between a URL on the URL block list, or if a web page is found to contain a word or phrase in the content block list, the DFL-1000 NPG blocks the web page. The blocked web page is replaced with a message that you can edit using the DFL-1000 web-based manager.
Transparent mode provides the same basic firewall protection as NAT mode. Packets received by the DFL-1000 NPG are intelligently forwarded or blocked according to firewall policies. The DFL-1000 NPG can be inserted in your network at any point without the need to make changes to your network or any of its components.
For troubleshooting and professional scripting, you can access the DFL-1000 command line interface (CLI) by connecting a management computer serial port to the DFL-1000 RS-232 serial Console connector. You can also use the SSH protocol to create a secure connection to the DFL-1000 CLI from DFL-1000 User Manual...
Firewall Suite server using the WebTrends enhanced log format. Some models can also save logs to an optional internal hard drive. If a hard drive is not installed, you can configure most DFL-1000 NPGs to log the most recent events to shared system memory.
Page 14
Local DFL-1000 user database You can add user names to the local DFL-1000 user database. When you add a user name, you can specify a password or that the user can be authenticated using a RADIUS server. You can then add user names to user groups and make these user groups available for authenticating with firewall policies, dialup VPN, PPTP VPN, and L2TP VPN.
About this document This user manual describes how to install and configure the DFL-1000 NPG. This document contains the following information: • Getting started describes unpacking, mounting, and powering on the DFL-1000 NPG. • NAT/Route mode installation describes how to install the DFL-1000 NPG if you are planning on running it in NAT/Route mode.
Page 16
• Company Name • Location • Email address • Telephone Number • Software Version • Serial Number • Detailed description of your problem DFL-1000 User Manual...
Getting started This chapter describes unpacking, setting up, and powering on your DFL-1000 NPG. When you have completed the procedures in this chapter, you can proceed to one of the following: • If you are going to run your DFL-1000 NPG in NAT/Route mode, go to NAT/Route mode installation.
The DFL-1000 NPG can be installed on any stable surface. Make sure that the appliance has at least 1.5 in. (3.75 cm) of clearance on each side to allow for adequate air flow and cooling. The DFL-1000 NPG can also be mounted on a standard 19-inch rack. It requires 1 U of vertical space in the rack.
Flashing amber Network activity at this interface. interfaces (back) No link established. Initial configuration When the DFL-1000 NPG is first powered on, it is running in NAT/Route mode and has the basic configuration listed in DFL-1000 NPG initial power-on settings. DFL-1000 NPG initial power-on settings...
Connecting to the command line interface (CLI) As an alternative to the web-based manager, you can install and configure the DFL-1000 NPG using the CLI. Configuration changes made with the CLI are effective immediately without the need to reset the firewall or interrupt service.
For information on how to use the CLI, see the DFL-1000 CLI Reference Guide . Next steps Now that your DFL-1000 NPG is up and running, you can proceed to configure it for operation: • If you are going to run your DFL-1000 NPG in NAT/Route mode, go to NAT/Route mode installation.
NAT/Route mode installation This chapter describes how to install your DFL-1000 NPG in NAT/Route mode. If you want to install the DFL-1000 NPG in Transparent mode, see Transparent mode installation. This chapter includes: • Preparing to configure NAT/Route mode •...
IPs and firewall policies for each server that you configure. For each server located on your internal network the DFL-1000 adds an Ext -> Int policy. For each server located on your DMZ network, the DFL-1000 NPG adds an Ext -> DMZ policy.
Confirm that the addresses are correct. Enter: get system interface The CLI lists the IP address, netmask and other settings for each of the DFL-1000 NPG interfaces as well as the mode of the external interface (manual, DHCP, or PPPoE).
DFL-1000 NAT/Route mode connections Configuring your networks If you are running the DFL-1000 NPG in NAT/Route mode, your networks must be configured to route all Internet traffic to the IP address of the DFL-1000 NPG interface connected to that network. For your...
IP address of the DFL-1000 NPG internal interface. For your DMZ network, change the default gateway address of all computers and routers connected directly to your DMZ network to the IP address of the DFL-1000 DMZ interface. For your external network, route all packets to the DFL- 1000 NPG external interface.
Connecting to the web-based manager. Changing to Transparent mode The first time that you connect to the DFL-1000 NPG, it is configured to run in NAT/Route mode. To switch to Transparent mode using the web-based manager: • Go to System > Status .
IP default gateway field. Using the command line interface As an alternative to the setup wizard, you can configure the DFL-1000 NPG using the command line interface (CLI). To connect to the CLI, see Connecting to the command line interface (CLI).
<number> gateway <IP address> Example set system route number 1 gateway 204.23.1.2 You have now completed the initial configuration of the DFL-1000 NPG, and you can proceed to the next section. Setting the date and time For effective scheduling and logging, the DFL-1000 NPG date and time should be accurate.
Page 30
DFL-1000 Transparent mode connections DFL-1000 User Manual...
(port number). For the packet to be connected through the DFL-1000 NPG, you must have added a policy that matches the packet's source address, destination address, and service. The policy directs the action that the firewall should perform on the packet.
Run the DFL-1000 NPG in Transparent mode to provide firewall protection to a network with public addresses. The DFL-1000 NPG can be inserted in your network at any point without the need to make changes to your network or any of its components.
Page 33
Select Allow outbound so that users can connect to the destination address behind the outbound remote VPN gateway. Inbound NAT Select Inbound NAT to translate the source address of incoming packets to the DFL-1000 NPG internal IP address. Outbound Select Inbound NAT to translate the source address of outgoing packets to the DFL-1000 NPG external IP address.
Page 34
Limit bandwidth to keep less important services from using bandwidth needed for Bandwidth more important services. Select High, Medium, or Low. Select Traffic Priority so that the DFL-1000 NPG manages the relative priorities of different types of traffic. For example, a policy for connecting to a secure Traffic web server needed to support e-commerce traffic should be assigned a high traffic priority.
Adding a NAT/Route Int -> Ext policy Adding Transparent mode policies Add Transparent mode policies to control the network traffic that is allowed to pass through the DFL-1000 NPG when you are running the firewall in Transparent mode. • Go to Firewall > Policy .
Page 36
Select OK to add the policy. The policy is added to the policy list. • Arrange policies in the policy list so that they have the results that you expect. Arranging policies in a policy list is described in Configuring policy lists. DFL-1000 User Manual...
The DFL-1000 NPG then starts at the top of the selected policy list and searches down the list for the first policy that matches the connection attempt source and destination addresses, service port, and time and...
POP3 to get email, use FTP to download files through the DFL-1000 NPG, and so on. If the default policy is at the top of the Int -> Ext policy list, the firewall allows all connections from the internal network to the Internet because all connections match the default policy.
The netmask should correspond to the address. The netmask for the IP address of a single computer should be 255.255.255.255. The netmask for a subnet should be 255.255.255.0. • Select OK to add the address. Adding an internal address DFL-1000 User Manual...
Members list. • To remove addresses from the address group, select an address from the Members list and select the left arrow to remove it from the group. • Select OK to add the address group. DFL-1000 User Manual...
• Predefined services • Providing access to custom services • Grouping services Predefined services The DFL-1000 predefined firewall services are listed in DFL-1000 predefined services. You can add these services to any policy. DFL-1000 predefined services Service name Description Protocol Port Match connections on any port.
Page 42
Rlogin service for remotely logging into a server. Routing Information Protocol. SMTP For sending mail between email servers on the Internet. 161-162 SNMP For communicating system status information. 161-162 SSH service for secure connections to computers for remote management. tcp DFL-1000 User Manual...
This name appears in the service list when you add a policy and cannot be the same as a predefined service name. The name can contain numbers (0-9), uppercase and lowercase letters (A-Z, a-z), and the special characters - and _. Other special characters and spaces are not allowed. DFL-1000 User Manual...
Internet at all times. You can add a one-time schedule to block access to the Internet during a holiday period. One-time schedules use the 24-hour clock. • Go to Firewall > Schedule > One-time . DFL-1000 User Manual...
You can also create a recurring schedule that runs for 24 hours by setting the start and stop times to the same time. Recurring schedules use the 24-hour clock. • Go to Firewall > Schedule > Recurring . • Select New to create a new schedule. DFL-1000 User Manual...
For example, to use a one-time schedule to deny access to a policy, add a policy that matches the policy to be denied in every way. Choose the one-time schedule that you added and set Action to DENY. Then place the policy containing the one-time schedule in the policy list above the policy to be denied. DFL-1000 User Manual...
Adding static NAT virtual IPsSee Adding static NAT virtual IPs • Adding static NAT virtual IPsSee Adding port forwarding virtual IPs • Adding static NAT virtual IPsSee Adding policies with virtual IPs Adding static NAT virtual IPs • Go to Firewall > Virtual IP . DFL-1000 User Manual...
Page 48
Firewall policies to which you can add virtual IPs External interface Map to IP Firewall policy Same subnet as the internal interface. Ext -> Int external Same subnet as the DMZ interface. Ext -> DMZ Same subnet as the internal interface. DMZ -> Int DFL-1000 User Manual...
80 (the HTTP port). • In Map to IP, enter the real IP address on the more secure network, for example, the IP address of a web server on your DMZ network. DFL-1000 User Manual...
Virtual IP settings and corresponding policy types External Interface MAP to IP Policy type external Internal network IP address. Ext -> Int external DMZ network IP address. Ext -> DMZ Internal network IP address. DMZ -> Int DFL-1000 User Manual...
IP pool. If you have configured the external interface to use PPPoE or DHCP, you can only set the Start IP and End IP to the current IP address of the external interface. • Select OK. DFL-1000 User Manual...
IP/MAC binding protects the DFL-1000 NPG and your network from IP spoofing attacks. IP spoofing attempts to use the IP address of a trusted computer to connect to or through the DFL-1000 NPG from a different computer. The IP address of a computer can easily be changed to a trusted address, but MAC addresses are added to ethernet cards at the factory and cannot easily be changed.
Configuring IP/MAC binding for packets going to the firewall Use the following procedure to use IP/MAC binding to filter packets that would normally connect with the firewall (for example, when an administrator is connecting to the DFL-1000 NPG for management). •...
• Select Enable IP/MAC binding going to the firewall to turn on IP/MAC binding for packets connecting to the DFL-1000 NPG. • Configure how IP/MAC binding handles packets with IP and MAC addresses that are not defined in the IP/MAC list.
Routing policy for access to a server from the internal network The following example routing policy, to accept connections from the internal network and forward them to the DMZ network, is similar to any routing policy. In this example, the DFL-1000 NPG is running in DFL-1000 User Manual...
Select New to add a new policy. • Configure the policy. Source External_All. Destination The address added in step 1. Schedule Always. Select a service to match the Internet server. Service For a web server, select HTTP. DFL-1000 User Manual...
The following example procedure, to periodically deny access to a public web server to allow for regular maintenance, is similar to any procedure to deny a connection that would otherwise be accepted by an existing policy. In this example, the DFL-1000 NPG is running in NAT/Route mode. To use a schedule to deny access: •...
The following example procedure, to prevent all users on the internal network from using POP3 to connect to an email server on the Internet, is similar to any procedure to deny a connection that would otherwise be accepted by the default policy. In this example, the DFL-1000 NPG is running in NAT/Route mode.
The following example procedure describes how to configure the firewall to require users on the internal network to authenticate to access POP3 servers on the Internet. In this example, the DFL-1000 NPG is running in NAT/Route mode, but the configuration would be the same for a DFL-1000 NPG running in Transparent mode.
Page 60
DNS by making sure that the default policy is not removed from the policy list. You can also add a policy to the top of the Int -> Ext policy list that includes the DNS service, has action set to ACCEPT, and does not include authentication. DFL-1000 User Manual...
DFL-1000 NPGs support user authentication to the DFL-1000 user database or to a RADIUS server. You can add user names to the DFL-1000 user database and then add a password to allow the user to authenticate using the internal database. You can also add the name of a RADIUS server and select RADIUS to allow the user to authenticate using the selected RADIUS server.
DFL-1000 RADIUS configuration. See Configuring RADIUS support. • Select Try other servers if connect to selected server fails if you want the DFL-1000 NPG to try to connect to other RADIUS servers added to the DFL-1000 RADIUS configuration. • Select OK.
If you have configured RADIUS support and a user is required to authenticate using a RADIUS server, the DFL-1000 NPG contacts the RADIUS server for authentication. When using a RADIUS server for user authentication, PPTP and L2TP encryption is not supported and you should not select Require data encryption when configuring Windows clients for PPTP or L2TP.
Adding user groups • Deleting user groups Adding user groups Use the following information to add user groups to your DFL-1000 configuration. You can add user names and RADIUS servers to user groups. To add a user group: • Go to User > User Group.
You cannot delete user groups that have been selected in a policy or remote gateway, PPTP, or L2TP configuration. To delete a user group: • Go to User > User Group • Select Delete beside the user group that you want to delete. • Select OK. DFL-1000 User Manual...
Remote or travelling workers can use a VPN client to connect to their office private network. The DFL-1000 NPG is an excellent choice for connecting a satellite office to a main office VPN. The main office would usually be protected by a high-capacity product such as the DFL-1000-400 NPG or DFL- 1000-500 NPG.
Interoperability with IPSec VPN products Because the DFL-1000 NPG supports the IPSec industry standard for VPN, you can configure a VPN between a DFL-1000 NPG and any client or gateway/firewall that supports IPSec VPN. DFL-1000 IPSec VPNs support: • IPSec Internet Protocol Security standard •...
Use a dialup VPN configuration to allow remote clients or VPN gateways with dynamic IP addresses to connect to a DFL-1000 VPN gateway. Clients or gateways with dynamic IP addresses can be home or travelling users who dial into the Internet and are dynamically assigned an IP address by their ISP (using PPPoE, DHCP, or a similar protocol).
Configuring a VPN Concentrator for hub and spoke VPN A hub and spoke VPN consists of a VPN Concentrator on a central DFL-1000 NPG (the hub) and two or more VPN tunnels (the spokes). The spoke VPNs communicate with each other through the hub VPN Concentrator.
Add additional encrypt policies between the member VPNs. Use the following configuration: Source Local member VPN address. Destination Remote member VPN address Action ENCRYPT VPN Tunnel The VPN tunnel added in step 2. Allow inbound Select allow inbound. DFL-1000 User Manual...
Adding a remote gateway Add a remote gateway configuration to define the parameters that the DFL-1000 NPG uses to connect to and establish an AutoIKE key VPN tunnel with a remote VPN gateway or a remote VPN client. The remote gateway configuration consists of the IP address of the remote VPN gateway or client as well as the P1 proposal settings required to establish the VPN tunnel.
Page 72
Mode. Enter the IP address of the dialup user or the domain name of the dialup user (for Local ID example, domain.com). If you do not add a local ID, the DFL-1000 external interface automatically becomes the Local ID. For information about authentication and the Local ID, see About dialup VPN authentication.
Adding a remote gateway (Dialup User selected) About dialup VPN authentication For dialup VPN authentication to work you must create compatible configurations on the DFL-1000 NPG that is the dialup server and its dialup clients. The configurations required for the server and the clients are different for different dialup gateway configurations.
Page 74
Clients authenticate with the server using their authentication keys. Aggressive mode with no user group Field Server Clients User Group None Mode Aggressive Aggressive Authentication Key The server and the clients must have the same authentication key. Local ID empty Empty DFL-1000 User Manual...
When you configure the remote gateway P1 proposal, you are selecting the algorithms that the DFL-1000 NPG proposes during phase 1 negotiation. You can select up to three different encryption and authentication algorithm combinations. Choosing more combinations might make it easier for P1 negotiation, but you can restrict the choice to one if required.
Concentrator next time you open the tunnel, the Concentrator field displays the name of the concentrator to which you have added the tunnel. • Select OK to save the AutoIKE key VPN tunnel. DFL-1000 User Manual...
If packets arrive out of sequence, the DFL-1000 NPG discards them. The DFL-1000 NPG sends an alert email when replay detection detects a replay packet. To receive the alert email, you must configure alert email and select "Enable alert email for critical firewall/VPN events or violations".
Local SPI at the opposite end of the tunnel. The Remote SPI value must be greater than bb8. Remote Gateway Enter the external IP address of the DFL-1000 NPG or other IPSec gateway at the opposite end of the tunnel.
You can add VPN tunnels to a VPN concentrator grouping to create a hub and spoke configuration. The VPN concentrator allows VPN traffic to pass from one tunnel to the other through the DFL-1000 NPG. To add a hub and spoke configuration: •...
For example, if you have users on your internal network that should be able to connect to a network behind a remote DFL-1000 NPG VPN gateway on the Internet, you must add an Int -> Ext encrypt policy. The source of this policy must be an address on your internal network. The destination of this policy must be the address of the network behind the remote DFL-1000 NPG gateway.
Page 81
Select Allow outbound to enable outbound users to connect to the destination address. outbound Inbound The DFL-1000 NPG translates the source address of incoming packets to the IP address of the DFL-1000 interface connected to the source address network. Outbound The DFL-1000 NPG translates the source address of outgoing packets to the IP address of the DFL-1000 interface connected to the destination address network.
The Status column displays the status of each tunnel. If Status is Up, the tunnel is active. If Status is Down, the tunnel is not active. The Timeout column displays the time before the next key exchange. The time is calculated by subtracting the time elapsed since the last key exchange from the keylife. DFL-1000 User Manual...
The IPSec VPN tunnel starts automatically when the first data packet destined for the VPN is intercepted by the DFL-1000 NPG. To confirm that a VPN between a network and one or more clients has been configured correctly, start a VPN client and use the ping command to connect to a computer on the internal network.
DFL-1000 NPG to protect a branch office and a small main office. Both of these DFL-1000 NPGs can be configured as IPSec VPN gateways to create the VPN that connects the branch office network to the main office network.
Mode Main (ID Protection) Main (ID Protection) P1 Proposal 1- Encryption 3DES 3DES Authentication SHA1 SHA1 DH Group Keylife 28800 seconds 28800 seconds Authentication (Pre-shared Key) ddcHH01887d ddcHH01887d Local ID Blank Blank NAT-traversal Enable Enable Keepalive Frequency DFL-1000 User Manual...
Go to VPN > IPSEC > Remote Gateway . • Select New to add a remote gateway. • On the Main Office DFL-1000 NPG configure the remote gateway using the Main Office information in Example remote gateway configuration. • On the Branch Office DFL-1000 NPG configure the remote gateway using the Branch Office...
Go to Firewall > Address > Internal . • Select New to add an address. • On the Main Office DFL-1000 NPG, enter the Address Name, IP Address, and NetMask, using the Main Office source address information in IPSec VPN source and destination addresses.
• Select Int -> Ext. • Select New to add a new policy. • On the Main Office DFL-1000 NPG set Source and Destination to the Main Office Source and Destination shown in Example encrypt policies. • On the Branch Office DFL-1000 NPG set Source and Destination to the Branch Office Source and...
AutoIKE key tunnel for the example VPN in Example VPN between a main office internal network and a remote client. Example AutoIKE key tunnel configuration Field name Tunnel information Tunnel Name Client_VPN DFL-1000 User Manual...
Enter the Address Name, IP Address, and NetMask, using the Source Address information in Example source and destination addresses for a client with a static IP address. • Select OK to save the source address. • Repeat these steps (this time selecting the External address list) to add destination address. DFL-1000 User Manual...
The VPN client must be running industry-standard IPSec AutoIKE key VPN client software, such as the D-Link Remote VPN Client. Configure the client as required to connect to the DFL-1000 VPN gateway using an IPSec VPN configuration. Make sure that the client configuration matches the DFL-1000 remote gateway and VPN...
Use a dialup VPN configuration to allow remote VPN gateways or clients with dynamic IP addresses to connect to a DFL-1000 VPN gateway. Gateways or clients with dynamic IP addresses can be home or travelling users who dial into the Internet and are dynamically assigned an IP address by their ISP (using PPPoE, DHCP, or a similar protocol).
If you are configuring dialup VPN for a remote client, use the procedures in Adding source and destination addresses for a remote client VPN. Use the information in Example source and destination addresses for a client with a static IP address. DFL-1000 User Manual...
Configuring remote IPSec VPN gateways for dialup VPN The remote IPSec VPN gateways must be DFL-1000 IPSec VPN gateways or third-party IPSec VPN gateways running industry-standard IPSec AutoIKE key VPN software. Configure the VPN gateway as required to connect to the dialup VPN gateway using an IPSec AutoIKE key VPN configuration.
• Repeat steps Select New to add a manual key tunnel. Select OK to save the manual key tunnel. the appropriate DFL-1000 NPG, using the Branch Office information in Example manual key tunnel configuration. Adding source and destination addresses Use the procedure Adding source and destination addresses for a network-to-network VPN.
The Local and Remote SPI values for the DFL-1000 VPN gateway and the client should complement each other. You can use any HEX characters for the Local and Remote SPI. The Local SPI on the DFL-1000 VPN gateway should match the Remote SPI on the client. The Remote SPI on the DFL-1000 VPN gateway should match the Local SPI on the client.
Using a VPN concentrator you can create a hub and spoke VPN configuration to direct traffic through a central DFL-1000 NPG from one VPN tunnel to another VPN tunnel. You create the hub and spoke configuration by adding a VPN concentrator to the central (or hub) DFL-1000 NPG and then adding VPN tunnels to the concentrator.
Adding encrypt policies Configuring the spokes For Branch 1 and Branch 2, you create remote gateways and AutoIKE key tunnels and then add the tunnels to the VPN concentrator. You then add policies to direct the VPN traffic. DFL-1000 User Manual...
Main Office information Branch 1 information Branch 2 information Source Address Address Name Main_Office Branch1 Branch2 IP address 192.168.1.0 192.168.2.0 192.168.3.0 Netmask 255.255.255.0 255.255.255.0 255.255.255.0 Destination Address Address Name Branch1 Branch2 Main_Office Main_Office IP address 192.168.2.0 192.168.3.0 192.168.1.0 192.168.1.0 DFL-1000 User Manual...
Branch 1 to Branch 2 Source 192.168.2.0 Destination 192.168.3.0 Action Encrypt VPN Tunnel Name Main_Office_VPN Branch Office 2 encrypt policies Field name Policy information Branch 2 to Main Office Source 192.168.3.0 Destination 192.168.1.0 Action Encrypt VPN Tunnel Name Main_Office_VPN DFL-1000 User Manual...
Page 102
Branch 2 to Branch 1 Source 192.168.3.0 Destination 192.168.2.0 Action Encrypt VPN Tunnel Name Main_Office_VPN DFL-1000 User Manual...
L2TP VPN configuration PPTP VPN configuration PPTP clients must be able to authenticate with the DFL-1000 NPG to start a PPTP session. To support PPTP authentication, you must add a user group to the DFL-1000 NPG configuration. This user group can contain users added to the DFL-1000 NPG user database, RADIUS servers, or both.
• Configuring a Windows XP client for PPTP PPTP VPN between a Windows client and the DFL-1000 NPG Configuring the DFL-1000 NPG as a PPTP gateway Create a user group for the PPTP clients. Users and authentication. • Go to VPN > PPTP > PPTP Range .
Use the following procedure to configure a client computer running Windows 98 so that it can connect to a DFL-1000 PPTP VPN. To configure the Windows 98 client, you must install and configure Windows dialup networking and virtual private networking support.
For Network Connection Type, select Connect to a private network through the Internet and select Next. • For Destination Address, enter the IP address or host name of the DFL-1000 NPG to connect to and select Next. • Set Connection Availability to Only for myself and select Next.
If the Public Network dialog box appears, choose the appropriate initial connection and select Next. • In the VPN Server Selection dialog, enter the IP address or host name of the DFL-1000 NPG to connect to and select Next. •...
This user name and password is not the same as your VPN user name and password. L2TP VPN configuration L2TP clients must be able to authenticate with the DFL-1000 NPG to start a L2TP session. To support L2TP authentication, you must add a user group to the DFL-1000 NPG configuration. This user group can contain users added to the DFL-1000 NPG user database, RADIUS servers, or both.
Add the addresses to which L2TP users can connect to the interface connected to the destination network. The addresses can be grouped into an address group. • Add a policy to allow L2TP clients to connect through the DFL-1000 NPG. DFL-1000 User Manual...
For Network Connection Type, select Connect to a private network through the Internet and select Next. • For Destination Address, enter the address of the DFL-1000 NPG to connect to and select Next. • Set Connection Availability to Only for myself and select Next.
If the Public Network dialog box appears, choose the appropriate initial connection and select Next. • In the VPN Server Selection dialog, enter the IP address or host name of the DFL-1000 NPG to connect to and select Next. •...
Page 112
• In the connect window, enter the User Name and Password that you use to connect to your dialup network connection. This user name and password is not the same as your VPN user name and password. DFL-1000 User Manual...
When the DFL-1000 NPG blocks a web page, the user who requested the blocked page receives a block message and the DFL-1000 NPG writes a message to the event log.
• Type a banned word or phrase. If you type a single word (for example, banned ), the DFL-1000 NPG blocks all web pages that contain that word. If you type a phrase (for example, banned phrase ), the DFL-1000 NPG blocks web pages that contain both words.
Select Backup Banned Word list The DFL-1000 NPG downloads the banned word list to a text file on the management computer. You can specify a location to which to download the text file as well as a name for the text file.
When the DFL-1000 NPG blocks a web page, the user who requested the blocked page receives a block message and the DFL-1000 NPG writes a message to the event log.
Change the text of the message. You can add HTML code to this message. • Select OK to save your changes. The DFL-1000 NPG will now display this message when a URL is blocked. Adding URLs to the URL block list •...
Uploading a URL block list You can create a URL block list in a text editor and then upload the text file to the DFL-1000 NPG. Add one URL to each line of the text file. You can follow the URL with a space and then a 1 to enable or a zero (0) to disable the URL.
Removing scripts from web pages Use the following procedure to configure the DFL-1000 NPG to remove scripts from web pages. You can configure the DFL-1000 NPG to block Java applets, cookies, and ActiveX. Blocking of any of these items might prevent some web pages from working properly.
You can enter multiple URLs and then select Check All to activate all entries in the Exempt URL list. Each page of the Exempt URL list displays 100 URLs. • Use Page Down and Page Up to navigate through the Exempt URL list. DFL-1000 User Manual...
Uploading an Exempt URL list You can create a Exempt URL list in a text editor and then upload the text file to the DFL-1000 NPG. Add one URL to each line of the text file. You can follow the URL with a space and then a 1 to enable or a zero (0) to disable the URL.
Page 122
Enter the path and filename of your Exempt URL list text file, or select Browse and locate the file. • Select OK to upload the file to the DFL-1000 NPG. • Select Return to display the updated Exempt URL list.
• the DFL-1000 system memory (if your DFL-1000 NPG does not contain a hard disk). Logging to system memory is not available on all DFL-1000 models. The optional hard disk is not available for all DFL-1000 models. You can also configure the kind of information that is logged.
Example log settings with optional hard disk Recording logs on the DFL-1000 hard disk You can record log files on the DFL-1000 hard disk if one is installed on your system. If you do not have a hard disk installed, see...
Logging event log to memory If your DFL-1000 does not contain a hard disk, you can use the following procedure to configure the DFL- 1000 to reserve some system memory for storing current event log messages. The DFL-1000 can store a limited number of messages in system memory.
Select Apply to save your log settings. Viewing event log saved to memory If the DFL-1000 is configured to save event log messages to memory, you can use the web-based manager to view, search, and clear the event log messages. This section describes: •...
• Select OK. Viewing and maintaining logs saved to the hard disk If your DFL-1000 contains a hard disk for recording logs, you can use the following procedures to view, search and maintain traffic and event logs: • Viewing logs •...
You can download traffic, or event log files to the management computer as plain text files. After downloading, you can view the log file with any text editor. Use the following procedure to download log files: • Go to Log&Report > Logging . • Select Traffic Log , or Event Log. DFL-1000 User Manual...
If they have not already been added, add the primary and secondary DNS server addresses provided to you by your ISP. Because the DFL-1000 uses the SMTP server name to connect to the mail server, it must be able to look up this name on your DNS server.
Critical VPN events include when replay detection detects a replay packet. Replay detection can be configured for both manual key and AutoIKE Key VPN tunnels. • Select Send alert email when disk is full to have the DFL-1000 send an alert email when the hard disk is almost full. •...
Each event log message records the date and time of the event and a description of the event. For connections to the DFL-1000 for management and for configuration changes, the event log message also includes the IP address of the management computer.
Administration This chapter describes how to use the web-based manager to administer and maintain the DFL-1000 NPG. It contains the following sections: • System status • Upgrading the DFL-1000 firmware • Displaying the DFL-1000 NPG serial number • Backing up system settings •...
If you log into the web-based manager with any other administrator account, you can go to System > Status to view the system settings including: • Displaying the DFL-1000 NPG serial number All administrative users can also go to System > Status > Monitor and view DFL-1000 NPG system status: • System status monitor Upgrading the DFL-1000 firmware D-Link releases new versions of the DFL-1000 firmware periodically.
Page 134
The following message appears: Enter TFTP Server Address [192.168.1.168]: You only have 3 seconds to press any key. If you do not press any key soon enough, the DFL-1000 NPG reboots and you must log in and repeat the execute reboot command.
Displaying the DFL-1000 NPG serial number • Go to System > Status . The serial number is displayed in the Status window. The serial number is specific to your DFL-1000 NPG and does not change with firmware upgrades. Backing up system settings This procedure does not back up the web content and URL filtering lists.
DFL-1000 NPG. Changing to Transparent mode Use the following procedure if you want to switch the DFL-1000 NPG from NAT/Route mode to Transparent mode. Changing to Transparent mode deletes all NAT/Route mode policies and addresses. In addition any routing set in NAT mode is also deleted.
The number of days, hours, and minutes since the DFL-1000 NPG was last started. Total Number of Sessions The total number of active communication sessions to and through the DFL-1000 NPG. Each line of the system status monitor displays the following information about each active firewall...
The time, in seconds, before the connection expires. Clear Stop and active communication session. Network configuration Go to System > Network to make any of the following changes to the DFL-1000 NPG network settings: • Configuring the internal interface •...
Go to System > Network > Interface . • For the external interface, select Modify • Set Addressing mode to Manual. • Change the IP address and Netmask as required. • Select OK to save your changes. DFL-1000 User Manual...
Page 140
Set Addressing mode to DHCP and select OK to change to DHCP mode. Both the IP address and Netmask change to 0.0.0.0. • Select Enable Connect to DHCP server if you want the DFL-1000 NPG to automatically connect to a DHCP server when it starts up. •...
Page 141
(MTU) of the packets that the DFL-1000 NPG transmits from its external interface. Ideally, you want this MTU to be the same as the smallest MTU of all the networks between the DFL-1000 NPG and the Internet. If the packets that the DFL-1000 NPG sends are larger, they get broken up or fragmented, which slows down transmission speeds.
Select the management Access methods for each interface. By default in Transparent mode, you manage the DFL-1000 NPG by connecting to the internal or dmz interface. However, you can configure the management interface so that you can manage the DFL- 1000 NPG by connecting to any interface.
The first step in configuring DFL-1000 NPG routing is to add routing gateways. Routing gateways are the gateways on your network that you want to route DFL-1000 NPG traffic to. You can add the IP address of each routing gateway, and you can also optionally configure the DFL-1000 NPG to ping the routing...
Select New to add a new routing gateway. • Enter the IP address of the routing gateway. This IP address should be on the same subnet as the DFL-1000 NPG interface that connects to this gateway. • Select Dead gateway detection if you want the DFL-1000 NPG to confirm connectivity with the gateway.
The DFL-1000 NPG assigns routes by searching for a match starting at the top of the routing table and moving down until it finds the first match. You must arrange routes in the routing table from more specific to more general.
Routing table Enabling RIP server support Enable routing information protocol (RIP) server support to configure the DFL-1000 NPG to act like a RIP server. The RIP routing protocol maintains up-to-date dynamic routing tables between nearby routers. When you enable RIP server support, the DFL-1000 NPG acts like a RIP server, broadcasting RIP packets to other nearby routers to: •...
Page 147
WAN connection to the DMZ interface. The WAN networks have the following IP addresses: Example multiple Internet connection configuration External interface 15.1.2.99 T1 gateway connected to external interface 15.1.2.1 DMZ interface 16.1.2.99 Broadband gateway connected to DMZ interface 16.1.2.1 Internal interface 192.168.1.99 DFL-1000 User Manual...
16.1.2.1 15.1.2.1 Providing DHCP services to your internal network If the DFL-1000 NPG is operating in NAT/Route mode, you can configure it to be the DHCP server for your internal network: • Go to System > Network > DHCP .
Page 149
Viewing the dynamic IP list If you have configured your DFL-1000 NPG as a DHCP server, you can view a list of IP addresses that the DHCP server has added, their corresponding MAC addresses, and the expiry time and date for these addresses.
Example dynamic IP list System configuration Go to System > Config to make any of the following changes to the DFL-1000 NPG system configuration: • Setting system date and time • Changing web-based manager options • Adding and editing administrator accounts •...
To configure the DFL-1000 NPG to use NTP, select Synchronize with NTP Server. By default, the DFL-1000 NPG is configured to connect to an NTP server at IP address 192.5.5.250, which is the IP address of an NTP server maintained by the Internet Software Consortium at Palo Alto, CA, USA.
Optionally type a Trusted Host IP address and netmask for the location from which the administrator can log into the web-based manager. If you want the administrator to be able to access the DFL-1000 NPG from any address, set the trusted host to 0.0.0.0 and the wildcard mask to 255.255.255.255.
Select Enable SNMP. • Configure SNMP settings: Type a name for this DFL-1000 NPG. The system name can be up to 31 characters long and can System Name contain numbers (0-9), uppercase and lowercase letters (A-Z, a-z), and the special characters - and _.
Page 154
Also called read community, get community is a password to identify SNMP get requests sent to the DFL-1000 NPG. When an SNMP manager sends a get request to the DFL-1000 NPG, it must include the correct get community string. The default get community string is "public". Change the default get community string to keep intruders from using get requests to retrieve information about your network configuration.
Page 155
L2TP DFL-1000 traps The DFL-1000 agent can send traps to up to three SNMP trap receivers on your network that are configured to receive traps from the DFL-1000 NPG. The DFL-1000 agent sends traps in response to the events listed in SNMP traps.
HTTPS : The SSL protocol for transmitting private documents over the Internet using a Web browser. Internal interface : The DFL-1000 interface that is connected to your internal (private) network. Internet : A collection of networks connected together that span the entire globe using the NFSNET as their backbone.
Page 157
Subnet : A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the same prefix. For example, all devices with IP addresses that start with 100.100.100. would be part of the same subnet. Dividing a network into DFL-1000 User Manual...
Page 158
VPN, Virtual Private Network : A network that links private networks over the Internet. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that data cannot be intercepted. DFL-1000 User Manual...
Change the administrator password. See Adding and editing administrator accounts. Q: I have the DFL-1000 configured the way I want it. Is there some way to save the configuration before making any more changes? Backing up system settings Restoring system settings.
Q: I am worried about dangerous web content so I set the Script Filter options to block all scripts, Java Applets, ActiveX, and cookies. Now people are complaining that some web sites are inaccessible or don't work properly. Removing scripts from web pages. DFL-1000 User Manual...
Q: How can I record DFL-1000 logs on a remote computer, such as a management computer? You can send DFL-1000 logs to a WebTrends server or a syslog server. To do this, configure one of these servers and go to Log&Report > Log Setting . Select Log to remote host and enter the IP address of the computer running the syslog server.
8. What category best describes your company? Aerospace Engineering Education Finance Hospital Legal Insurance/Real Estate Manufacturing Retail/Chainstore/Wholesale Government Transportation/Utilities/Communication System house/company Other________________________________ 9. Would you recommend your D-Link product to a friend? Don't know yet 10.Your comments on this product? __________________________________________________________________________________________ __________________________________________________________________________________________ DFL-1000 User Manual...
(90) days after any replacement Software is delivered. If a material non-conformance is incapable of correction, or if D-Link determines in its sole discretion that it is not practical to replace the non- conforming Software, the price paid by the original licensee for the non-conforming Software will be refunded by D-Link;...
Page 166
D-Link Systems Inc., 53 Discovery Drive, Irvine CA 92618. D-Link may reject or return any product that is not packaged and shipped in strict compliance with the foregoing requirements, or for which an RMA number is not visible from the outside of the package. The product owner agrees to pay D-Link’s reasonable handling and return shipping charges for any product...
Page 167
Trademarks Copyright® 2001 D-Link Corporation. Contents subject to change without prior notice. D-Link is a registered trademark of D-Link Corporation/D-Link Systems, Inc. All other trademarks belong to their respective proprietors.
Need help?
Do you have a question about the DFL-1000 and is the answer not in the manual?
Questions and answers