D-Link 800 - DFL 800 - Security Appliance Manuals

Manuals and User Guides for D-Link 800 - DFL 800 - Security Appliance. We have 2 D-Link 800 - DFL 800 - Security Appliance manuals available for free PDF download: User Manual, Quick Manual

D-Link 800 - DFL 800 - Security Appliance User Manual

D-Link 800 - DFL 800 - Security Appliance User Manual (469 pages)

Network Security Firewall  
Brand: D-Link | Category: Firewall | Size: 6.97 MB
Table of contents
User Manual2................................................................................................................................................................
Table Of Contents4................................................................................................................................................................
Preface12................................................................................................................................................................
Example Notation12................................................................................................................................................................
Netdefendos Overview14................................................................................................................................................................
Features14................................................................................................................................................................
Netdefendos Architecture17................................................................................................................................................................
State-based Architecture17................................................................................................................................................................
Netdefendos Building Blocks17................................................................................................................................................................
Basic Packet Flow18................................................................................................................................................................
Netdefendos State Engine Packet Flow20................................................................................................................................................................
Packet Flow Schematic Part I20................................................................................................................................................................
Packet Flow Schematic Part Ii21................................................................................................................................................................
Packet Flow Schematic Part Iii22................................................................................................................................................................
Expanded Apply Rules Logic23................................................................................................................................................................
Management And Maintenance25................................................................................................................................................................
Managing Netdefendos25................................................................................................................................................................
Overview25................................................................................................................................................................
The Default Administrator Account26................................................................................................................................................................
The Web Interface26................................................................................................................................................................
Enabling Remote Management Via Https29................................................................................................................................................................
The Cli30................................................................................................................................................................
Enabling Ssh Remote Access34................................................................................................................................................................
Cli Scripts36................................................................................................................................................................
Secure Copy39................................................................................................................................................................
The Console Boot Menu41................................................................................................................................................................
Management Advanced Settings43................................................................................................................................................................
Working With Configurations44................................................................................................................................................................
Listing Configuration Objects44................................................................................................................................................................
Displaying A Configuration Object45................................................................................................................................................................
Editing A Configuration Object45................................................................................................................................................................
Adding A Configuration Object46................................................................................................................................................................
Deleting A Configuration Object47................................................................................................................................................................
Undeleting A Configuration Object47................................................................................................................................................................
Listing Modified Configuration Objects47................................................................................................................................................................
Activating And Committing A Configuration48................................................................................................................................................................
Events And Logging49................................................................................................................................................................
Event Messages49................................................................................................................................................................
Event Message Distribution49................................................................................................................................................................
Enable Logging To A Syslog Host50................................................................................................................................................................
Snmp Traps51................................................................................................................................................................
Advanced Log Settings52................................................................................................................................................................
Sending Snmp Traps To An Snmp Trap Receiver52................................................................................................................................................................
Radius Accounting54................................................................................................................................................................
Radius Accounting Messages54................................................................................................................................................................
Interim Accounting Messages56................................................................................................................................................................
Activating Radius Accounting56................................................................................................................................................................
Radius Accounting Security56................................................................................................................................................................
Radius Accounting And High Availability56................................................................................................................................................................
Handling Unresponsive Servers57................................................................................................................................................................
Accounting And System Shutdowns57................................................................................................................................................................
Limitations With Nat57................................................................................................................................................................
Radius Advanced Settings57................................................................................................................................................................
Radius Accounting Server Setup58................................................................................................................................................................
Snmp Monitoring59................................................................................................................................................................
Snmp Advanced Settings60................................................................................................................................................................
Enabling Snmp Monitoring60................................................................................................................................................................
The Pcapdump Command62................................................................................................................................................................
Maintenance65................................................................................................................................................................
Auto-update Mechanism65................................................................................................................................................................
Creating Backup Files65................................................................................................................................................................
Configuration Backup And Restore66................................................................................................................................................................
Backing Up The Entire System66................................................................................................................................................................
Restore To Factory Defaults67................................................................................................................................................................
Complete Hardware Reset To Factory Defaults67................................................................................................................................................................
Fundamentals70................................................................................................................................................................
The Address Book70................................................................................................................................................................
Ip Addresses70................................................................................................................................................................
Adding An Ip Host71................................................................................................................................................................
Adding An Ip Network71................................................................................................................................................................
Adding An Ip Range71................................................................................................................................................................
Ethernet Addresses72................................................................................................................................................................
Deleting An Address Object72................................................................................................................................................................
Adding An Ethernet Address72................................................................................................................................................................
Address Groups73................................................................................................................................................................
Auto-generated Address Objects73................................................................................................................................................................
Address Book Folders74................................................................................................................................................................
Services75................................................................................................................................................................
Listing The Available Services75................................................................................................................................................................
Viewing A Specific Service75................................................................................................................................................................
Tcp And Udp Based Services76................................................................................................................................................................
Adding A Tcp/udp Service77................................................................................................................................................................
Icmp Services78................................................................................................................................................................
Custom Ip Protocol Services79................................................................................................................................................................
Adding An Ip Protocol Service79................................................................................................................................................................
Interfaces80................................................................................................................................................................
Ethernet Interfaces81................................................................................................................................................................
Enabling Dhcp83................................................................................................................................................................
Vlan85................................................................................................................................................................
Defining A Vlan86................................................................................................................................................................
Pppoe87................................................................................................................................................................
Gre Tunnels89................................................................................................................................................................
Configuring A Pppoe Client89................................................................................................................................................................
Interface Groups92................................................................................................................................................................
Creating An Interface Group92................................................................................................................................................................
Arp In Netdefendos94................................................................................................................................................................
Arp Cache94................................................................................................................................................................
Displaying The Arp Cache95................................................................................................................................................................
Flushing The Arp Cache95................................................................................................................................................................
Static And Published Arp Entries96................................................................................................................................................................
Defining A Static Arp Entry96................................................................................................................................................................
Using Arp Advanced Settings97................................................................................................................................................................
Arp Advanced Settings Summary98................................................................................................................................................................
The Ip Rule Set101................................................................................................................................................................
Security Policies101................................................................................................................................................................
Simplified Netdefendos Traffic Flow102................................................................................................................................................................
Ip Rule Evaluation103................................................................................................................................................................
Ip Rule Actions104................................................................................................................................................................
Editing Ip Rule Set Entries105................................................................................................................................................................
Ip Rule Set Folders105................................................................................................................................................................
Adding An Allow Ip Rule105................................................................................................................................................................
Schedules107................................................................................................................................................................
Setting Up A Time-scheduled Policy107................................................................................................................................................................
Certificates109................................................................................................................................................................
Certificates In Netdefendos111................................................................................................................................................................
Ca Certificate Requests111................................................................................................................................................................
Uploading A Certificate111................................................................................................................................................................
Associating Certificates With Ipsec Tunnels111................................................................................................................................................................
Date And Time113................................................................................................................................................................
Setting Date And Time113................................................................................................................................................................
Setting The Current Date And Time113................................................................................................................................................................
Time Servers114................................................................................................................................................................
Setting The Time Zone114................................................................................................................................................................
Enabling Dst114................................................................................................................................................................
Enabling Time Synchronization Using Sntp115................................................................................................................................................................
Manually Triggering A Time Synchronization116................................................................................................................................................................
Modifying The Maximum Adjustment Value116................................................................................................................................................................
Forcing Time Synchronization116................................................................................................................................................................
Settings Summary For Date And Time117................................................................................................................................................................
Enabling The D-link Ntp Server117................................................................................................................................................................
Configuring Dns Servers119................................................................................................................................................................
Routing122................................................................................................................................................................
Static Routing123................................................................................................................................................................
The Principles Of Routing123................................................................................................................................................................
Using Local Ip Address With An Unbound Network126................................................................................................................................................................
Displaying The Routing Table128................................................................................................................................................................
Route Failover130................................................................................................................................................................
Displaying The Core Routes130................................................................................................................................................................
A Route Failover Scenario For Isp Access131................................................................................................................................................................
Host Monitoring For Route Failover133................................................................................................................................................................
Proxy Arp135................................................................................................................................................................
Policy-based Routing137................................................................................................................................................................
Policy-based Routing Tables137................................................................................................................................................................
Policy-based Routing Rules137................................................................................................................................................................
Pbr Table Selection138................................................................................................................................................................
The Ordering Parameter138................................................................................................................................................................
Creating A Policy-based Routing Table139................................................................................................................................................................
Creating The Route139................................................................................................................................................................
Policy-based Routing Configuration139................................................................................................................................................................
Route Load Balancing141................................................................................................................................................................
The Rlb Round Robin Algorithm142................................................................................................................................................................
The Rlb Spillover Algorithm142................................................................................................................................................................
A Route Load Balancing Scenario145................................................................................................................................................................
Setting Up Rlb145................................................................................................................................................................
Dynamic Routing147................................................................................................................................................................
Dynamic Routing Overview147................................................................................................................................................................
Ospf148................................................................................................................................................................
Virtual Links Example 1150................................................................................................................................................................
Virtual Links Example 2151................................................................................................................................................................
Dynamic Routing Policy152................................................................................................................................................................
Importing Routes From An Ospf As Into The Main Routing Table152................................................................................................................................................................
Exporting The Default Route Into An Ospf As153................................................................................................................................................................
Multicast Routing155................................................................................................................................................................
Multicast Forwarding Using The Sat Multiplex Rule155................................................................................................................................................................
Multicast Forwarding - No Address Translation156................................................................................................................................................................
Forwarding Of Multicast Traffic Using The Sat Multiplex Rule157................................................................................................................................................................
Multicast Forwarding - Address Translation158................................................................................................................................................................
Igmp Configuration159................................................................................................................................................................
Multicast Snoop160................................................................................................................................................................
Multicast Proxy160................................................................................................................................................................
Igmp - No Address Translation161................................................................................................................................................................
If1 Configuration162................................................................................................................................................................
If2 Configuration - Group Translation163................................................................................................................................................................
Advanced Igmp Settings164................................................................................................................................................................
Transparent Mode167................................................................................................................................................................
Enabling Internet Access171................................................................................................................................................................
Non-transparent Mode Internet Access171................................................................................................................................................................
Transparent Mode Internet Access172................................................................................................................................................................
Transparent Mode Scenarios173................................................................................................................................................................
Transparent Mode Scenario 1173................................................................................................................................................................
Setting Up Transparent Mode For Scenario 1173................................................................................................................................................................
Transparent Mode Scenario 2174................................................................................................................................................................
Setting Up Transparent Mode For Scenario 2175................................................................................................................................................................
Spanning Tree Bpdu Support177................................................................................................................................................................
Advanced Settings For Transparent Mode177................................................................................................................................................................
An Example Bpdu Relaying Scenario177................................................................................................................................................................
Dhcp Services182................................................................................................................................................................
Dhcp Servers183................................................................................................................................................................
Setting Up A Dhcp Server184................................................................................................................................................................
Checking The Status Of A Dhcp Server184................................................................................................................................................................
Static Dhcp Assignment185................................................................................................................................................................
Dhcp Advanced Settings185................................................................................................................................................................
Setting Up Static Dhcp185................................................................................................................................................................
Dhcp Relaying187................................................................................................................................................................
Setting Up A Dhcp Relayer187................................................................................................................................................................
Dhcp Relay Advanced Settings188................................................................................................................................................................
Ip Pools190................................................................................................................................................................
Creating An Ip Pool191................................................................................................................................................................
Security Mechanisms193................................................................................................................................................................
Access Rules193................................................................................................................................................................
Introduction193................................................................................................................................................................
Ip Spoofing193................................................................................................................................................................
Access Rule Settings194................................................................................................................................................................
Setting Up An Access Rule195................................................................................................................................................................
Algs196................................................................................................................................................................
Deploying An Alg196................................................................................................................................................................
The Http Alg197................................................................................................................................................................
Http Alg Processing Order199................................................................................................................................................................
The Ftp Alg200................................................................................................................................................................
Protecting An Ftp Server With An Alg202................................................................................................................................................................
Protecting Ftp Clients205................................................................................................................................................................
The Tftp Alg206................................................................................................................................................................
The Smtp Alg207................................................................................................................................................................
Smtp Alg Processing Order209................................................................................................................................................................
Dnsbl Spam Filtering210................................................................................................................................................................
The Pop3 Alg216................................................................................................................................................................
The Sip Alg216................................................................................................................................................................
The H.323 Alg226................................................................................................................................................................
Protecting Phones Behind D-link Firewalls228................................................................................................................................................................
H.323 With Private Ip Addresses230................................................................................................................................................................
Two Phones Behind Different D-link Firewalls231................................................................................................................................................................
Using Private Ip Addresses232................................................................................................................................................................
H.323 With Gatekeeper233................................................................................................................................................................
H.323 With Gatekeeper And Two D-link Firewalls235................................................................................................................................................................
Using The H.323 Alg In A Corporate Environment236................................................................................................................................................................
Configuring Remote Offices For H.323238................................................................................................................................................................
Allowing The H.323 Gateway To Register With The Gatekeeper238................................................................................................................................................................
The Tls Alg239................................................................................................................................................................
Tls Termination239................................................................................................................................................................
Web Content Filtering242................................................................................................................................................................
Active Content Handling242................................................................................................................................................................
Static Content Filtering243................................................................................................................................................................
Stripping Activex And Java Applets243................................................................................................................................................................
Setting Up A White And Blacklist244................................................................................................................................................................
Dynamic Web Content Filtering245................................................................................................................................................................
Dynamic Content Filtering Flow245................................................................................................................................................................
Enabling Dynamic Web Content Filtering247................................................................................................................................................................
Enabling Audit Mode248................................................................................................................................................................
Reclassifying A Blocked Site250................................................................................................................................................................
Editing Content Filtering Http Banner Files257................................................................................................................................................................
Anti-virus Scanning259................................................................................................................................................................
Implementation259................................................................................................................................................................
Activating Anti-virus Scanning260................................................................................................................................................................
The Signature Database260................................................................................................................................................................
Subscribing To The D-link Anti-virus Service261................................................................................................................................................................
Anti-virus Options261................................................................................................................................................................
Intrusion Detection And Prevention265................................................................................................................................................................
Idp Availability In D-link Models265................................................................................................................................................................
Idp Database Updating266................................................................................................................................................................
Idp Rules267................................................................................................................................................................
Insertion/evasion Attack Prevention268................................................................................................................................................................
Idp Pattern Matching269................................................................................................................................................................
Idp Signature Groups270................................................................................................................................................................
Idp Actions271................................................................................................................................................................
Smtp Log Receiver For Idp Events272................................................................................................................................................................
Configuring An Smtp Log Receiver272................................................................................................................................................................
Setting Up Idp For A Mail Server273................................................................................................................................................................
Denial-of-service Attack Prevention276................................................................................................................................................................
Dos Attack Mechanisms276................................................................................................................................................................
Ping Of Death And Jolt Attacks276................................................................................................................................................................
Fragmentation Overlap Attacks: Teardrop, Bonk, Boink And Nestea277................................................................................................................................................................
The Land And Latierra Attacks277................................................................................................................................................................
The Winnuke Attack277................................................................................................................................................................
Amplification Attacks: Smurf, Papasmurf, Fraggle278................................................................................................................................................................
Tcp Syn Flood Attacks279................................................................................................................................................................
The Jolt2 Attack279................................................................................................................................................................
Distributed Dos Attacks279................................................................................................................................................................
Blacklisting Hosts And Networks280................................................................................................................................................................
Adding A Host To The Whitelist281................................................................................................................................................................
Address Translation283................................................................................................................................................................
Nat Ip Address Translation284................................................................................................................................................................
Adding A Nat Rule285................................................................................................................................................................
Anonymizing With Nat287................................................................................................................................................................
Nat Pools288................................................................................................................................................................
Using Nat Pools289................................................................................................................................................................
Translation Of A Single Ip Address (1:1)291................................................................................................................................................................
Enabling Traffic To A Protected Web Server In A Dmz291................................................................................................................................................................
Enabling Traffic To A Web Server On An Internal Network293................................................................................................................................................................
Translation Of Multiple Ip Addresses (m:n)294................................................................................................................................................................
Translating Traffic To Multiple Protected Web Servers295................................................................................................................................................................
All-to-one Mappings (n:1)297................................................................................................................................................................
Port Translation297................................................................................................................................................................
Protocols Handled By Sat297................................................................................................................................................................
Multiple Sat Rule Matches298................................................................................................................................................................
Sat And Fwdfast Rules298................................................................................................................................................................
User Authentication302................................................................................................................................................................
Authentication Setup304................................................................................................................................................................
Setup Summary304................................................................................................................................................................
The Local Database304................................................................................................................................................................
External Radius Servers304................................................................................................................................................................
External Ldap Servers305................................................................................................................................................................
Normal Ldap Authentication308................................................................................................................................................................
Authentication Rules309................................................................................................................................................................
Ldap For Ppp With Chap, Ms-chapv1 Or Ms-chapv2309................................................................................................................................................................
Authentication Processing310................................................................................................................................................................
Http Authentication311................................................................................................................................................................
Creating An Authentication User Group313................................................................................................................................................................
User Authentication Setup For Web Access313................................................................................................................................................................
Configuring A Radius Server314................................................................................................................................................................
Customizing Html315................................................................................................................................................................
Vpn Usage319................................................................................................................................................................
Vpn Encryption320................................................................................................................................................................
Vpn Planning320................................................................................................................................................................
Key Distribution321................................................................................................................................................................
The Tls Alternative For Vpn321................................................................................................................................................................
Vpn Quick Start323................................................................................................................................................................
Ipsec Lan To Lan With Pre-shared Keys323................................................................................................................................................................
Ipsec Lan To Lan With Certificates324................................................................................................................................................................
Ipsec Roaming Clients With Pre-shared Keys325................................................................................................................................................................
Ipsec Roaming Clients With Certificates327................................................................................................................................................................
L2tp Roaming Clients With Pre-shared Keys328................................................................................................................................................................
L2tp Roaming Clients With Certificates329................................................................................................................................................................
Pptp Roaming Clients330................................................................................................................................................................
Ipsec Components332................................................................................................................................................................
Internet Key Exchange (ike)332................................................................................................................................................................
Ike Authentication338................................................................................................................................................................
Ipsec Protocols (esp/ah)339................................................................................................................................................................
The Ah Protocol339................................................................................................................................................................
Nat Traversal340................................................................................................................................................................
The Esp Protocol340................................................................................................................................................................
Algorithm Proposal Lists341................................................................................................................................................................
Pre-shared Keys342................................................................................................................................................................
Using An Algorithm Proposal List342................................................................................................................................................................
Using A Pre-shared Key343................................................................................................................................................................
Identification Lists344................................................................................................................................................................
Using An Identity List344................................................................................................................................................................
Ipsec Tunnels346................................................................................................................................................................
Lan To Lan Tunnels With Pre-shared Keys346................................................................................................................................................................
Roaming Clients347................................................................................................................................................................
Setting Up A Psk Based Vpn Tunnel For Roaming Clients347................................................................................................................................................................
Setting Up A Self-signed Certificate Based Vpn Tunnel For Roaming Clients348................................................................................................................................................................
Setting Up A Ca Server Issued Certificate Based Vpn Tunnel For Roaming Clients349................................................................................................................................................................
Setting Up Config Mode351................................................................................................................................................................
Using Config Mode With Ipsec Tunnels351................................................................................................................................................................
Fetching Crls From An Alternate Ldap Server352................................................................................................................................................................
Troubleshooting With Ikesnoop352................................................................................................................................................................
Setting Up An Ldap Server352................................................................................................................................................................
Ipsec Advanced Settings360................................................................................................................................................................
Pptp/l2tp363................................................................................................................................................................
Pptp Servers363................................................................................................................................................................
L2tp Servers364................................................................................................................................................................
Setting Up A Pptp Server364................................................................................................................................................................
Setting Up An L2tp Server364................................................................................................................................................................
Setting Up An L2tp Tunnel Over Ipsec365................................................................................................................................................................
L2tp/pptp Server Advanced Settings368................................................................................................................................................................
Pptp/l2tp Clients369................................................................................................................................................................
Pptp Client Usage370................................................................................................................................................................
Ca Server Access371................................................................................................................................................................
Certificate Validation Components372................................................................................................................................................................
Vpn Troubleshooting374................................................................................................................................................................
Management Interface Failure With Vpn376................................................................................................................................................................
Traffic Management378................................................................................................................................................................
Traffic Shaping378................................................................................................................................................................
Traffic Shaping In Netdefendos379................................................................................................................................................................
Packet Flow Of Pipe Rule Set To Pipe380................................................................................................................................................................
Fwdfast Rules Bypass Traffic Shaping380................................................................................................................................................................
Simple Bandwidth Limiting381................................................................................................................................................................
Applying A Simple Bandwidth Limit381................................................................................................................................................................
Limiting Bandwidth In Both Directions382................................................................................................................................................................
Creating Differentiated Limits With Chains383................................................................................................................................................................
Precedences383................................................................................................................................................................
The Eight Pipe Precedences384................................................................................................................................................................
Guarantees385................................................................................................................................................................
Minimum And Maximum Pipe Precedence385................................................................................................................................................................
Differentiated Guarantees386................................................................................................................................................................
Groups387................................................................................................................................................................
Traffic Grouped Per Ip Address387................................................................................................................................................................
Recommendations388................................................................................................................................................................
A Summary Of Traffic Shaping389................................................................................................................................................................
More Pipe Examples390................................................................................................................................................................
A Basic Traffic Shaping Scenario390................................................................................................................................................................
Idp Traffic Shaping394................................................................................................................................................................
Setup394................................................................................................................................................................
Processing Flow395................................................................................................................................................................
The Importance Of Specifying A Network395................................................................................................................................................................
A P2p Scenario396................................................................................................................................................................
Viewing Traffic Shaping Objects396................................................................................................................................................................
Idp Traffic Shaping P2p Scenario396................................................................................................................................................................
Guaranteeing Instead Of Limiting Bandwidth397................................................................................................................................................................
Logging398................................................................................................................................................................
Threshold Rules399................................................................................................................................................................
Limiting The Connection Rate/total Connections399................................................................................................................................................................
Grouping399................................................................................................................................................................
Rule Actions399................................................................................................................................................................
Multiple Triggered Actions400................................................................................................................................................................
Exempted Connections400................................................................................................................................................................
Threshold Rules And Zonedefense400................................................................................................................................................................
Threshold Rule Blacklisting400................................................................................................................................................................
Server Load Balancing401................................................................................................................................................................
A Server Load Balancing Configuration401................................................................................................................................................................
Identifying The Servers402................................................................................................................................................................
The Load Distribution Mode402................................................................................................................................................................
The Distribution Algorithm403................................................................................................................................................................
Connections From Three Clients403................................................................................................................................................................
Stickiness And Round-robin404................................................................................................................................................................
Stickiness And Connection Rate404................................................................................................................................................................
Server Health Monitoring405................................................................................................................................................................
Slb_sat Rules405................................................................................................................................................................
Setting Up Slb406................................................................................................................................................................
High Availability409................................................................................................................................................................
Ha Mechanisms411................................................................................................................................................................
Ha Setup413................................................................................................................................................................
Hardware Setup413................................................................................................................................................................
High Availability Setup413................................................................................................................................................................
Netdefendos Manual Ha Setup414................................................................................................................................................................
Verifying The Cluster Is Functioning415................................................................................................................................................................
Using Unique Shared Mac Addresses416................................................................................................................................................................
Ha Issues417................................................................................................................................................................
Ha Advanced Settings418................................................................................................................................................................
Zonedefense420................................................................................................................................................................
Zonedefense Switches421................................................................................................................................................................
Zonedefense Operation422................................................................................................................................................................
Snmp422................................................................................................................................................................
Manual Blocking And Exclude Lists422................................................................................................................................................................
A Simple Zonedefense Scenario423................................................................................................................................................................
Zonedefense With Anti-virus Scanning424................................................................................................................................................................
Limitations424................................................................................................................................................................
Advanced Settings427................................................................................................................................................................
Ip Level Settings427................................................................................................................................................................
Tcp Level Settings431................................................................................................................................................................
Icmp Level Settings436................................................................................................................................................................
State Settings437................................................................................................................................................................
Connection Timeout Settings439................................................................................................................................................................
Length Limit Settings441................................................................................................................................................................
Fragmentation Settings443................................................................................................................................................................
Local Fragment Reassembly Settings447................................................................................................................................................................
Miscellaneous Settings448................................................................................................................................................................
A. Subscribing To Security Updates450................................................................................................................................................................
B. Idp Signature Groups452................................................................................................................................................................
C. Verified Mime Filetypes456................................................................................................................................................................
D. The Osi Framework460................................................................................................................................................................
D.1. The 7 Layers Of The Osi Model460................................................................................................................................................................
E. D-link Worldwide Offices461................................................................................................................................................................
Alphabetical Index463................................................................................................................................................................

Advertisement

D-link 800 - DFL 800 - Security Appliance Quick Manual

D-link 800 - DFL 800 - Security Appliance Quick Manual (20 pages)

D-link DFL-800 Security Firewall: Install Guide  
Brand: D-link | Category: Firewall | Size: 3.98 MB
Table of contents
Table Of Contents2................................................................................................................................................................
Before You Begin3................................................................................................................................................................
Check Your Package Contents3................................................................................................................................................................
Front View4................................................................................................................................................................
Led Indicators5................................................................................................................................................................
Default Interface Attribute Definition5................................................................................................................................................................
Connecting The Dfl-8006................................................................................................................................................................
Setting Up Firewall To Your Network6................................................................................................................................................................
Configure Dfl-8007................................................................................................................................................................
Configure Your Computer's Ip7................................................................................................................................................................
Using The Setup Wizard8................................................................................................................................................................
Appendix16................................................................................................................................................................
How To Configure Static Ip Manually On Microsoft Windows Xp16................................................................................................................................................................
How To Configure Static Ip Manually On Apple Mac Os X17................................................................................................................................................................
Warranty19................................................................................................................................................................

Share and save

Advertisement