User Guide
Page 4
... PARTICULAR PURPOSE. To receive the SofaWare GPL licensed code, contact [email protected]. Failure to do so may result in damage to the router. Overloaded AC outlets, extension cords, frayed power cords, damaged or cracked wire insulation, and broken plugs are not sure of the type of...you wish to break into other than the cord. Do not expose the appliance to the product. Do not disassemble or open the appliance. Failure to secure highly valuable or sensitive information. Do not use the appliance outdoors. Route power supply cords where they are not likely to address ...
... PARTICULAR PURPOSE. To receive the SofaWare GPL licensed code, contact [email protected]. Failure to do so may result in damage to the router. Overloaded AC outlets, extension cords, frayed power cords, damaged or cracked wire insulation, and broken plugs are not sure of the type of...you wish to break into other than the cord. Do not expose the appliance to the product. Do not disassemble or open the appliance. Failure to secure highly valuable or sensitive information. Do not use the appliance outdoors. Route power supply cords where they are not likely to address ...
User Guide
Page 99
...respond to pinging, the Internet connection is considered to be down. If for probing the connection, by selecting one of the next hop router, which these gateways to trigger ISP failover to an Internet connection from one hop away. Chapter 4: Configuring the Internet Connection 83 Next ...next hop will still be used, if the Probe Next Hop check box is selected. For example, if there is a problem with a different router at the same location). • Probe DNS Servers. Connection Probing Method While the Probe Next Hop option checks the availability of the following: ...
...respond to pinging, the Internet connection is considered to be down. If for probing the connection, by selecting one of the next hop router, which these gateways to trigger ISP failover to an Internet connection from one hop away. Chapter 4: Configuring the Internet Connection 83 Next ...next hop will still be used, if the Probe Next Hop check box is selected. For example, if there is a problem with a different router at the same location). • Probe DNS Servers. Connection Probing Method While the Probe Next Hop option checks the availability of the following: ...
User Guide
Page 107
...-down list, select WAN2. 4. For instructions, see Using Internet Setup on page 63. Connect a modem to the WAN port on your appliance's rear panel. 2. Using the NetDefend firewall's DMZ/WAN2 Port To set up a LAN or broadband backup Internet connection 1. Click Network in...Apply. 5. Connect a hub or switch to the DMZ/WAN2 port on your two modems or routers to the hub/switch. 3. Important: The two connections can be LAN DHCP connections. Connect your appliance's rear panel. 2. Chapter 4: Configuring the Internet Connection 91 Configure two Internet connections. Configuring a...
...-down list, select WAN2. 4. For instructions, see Using Internet Setup on page 63. Connect a modem to the WAN port on your appliance's rear panel. 2. Using the NetDefend firewall's DMZ/WAN2 Port To set up a LAN or broadband backup Internet connection 1. Click Network in...Apply. 5. Connect a hub or switch to the DMZ/WAN2 port on your two modems or routers to the hub/switch. 3. Important: The two connections can be LAN DHCP connections. Connect your appliance's rear panel. 2. Chapter 4: Configuring the Internet Connection 91 Configure two Internet connections. Configuring a...
User Guide
Page 159
In the Metric field, type the static route's metric. Chapter 5: Managing Your Network 143 The default value is 10. 8. The Step 2: Next Hop and Metric dialog box appears. In the Next Hop IP field, type the IP address of the gateway (next hop router) to which to the route that matches the packet's destination and has the lowest metric. Click Next. The gateway sends a packet to route the packets destined for this network. 7. Using Static Routes 6.
In the Metric field, type the static route's metric. Chapter 5: Managing Your Network 143 The default value is 10. 8. The Step 2: Next Hop and Metric dialog box appears. In the Next Hop IP field, type the IP address of the gateway (next hop router) to which to the route that matches the packet's destination and has the lowest metric. Click Next. The gateway sends a packet to route the packets destined for this network. 7. Using Static Routes 6.
User Guide
Page 252
... - When a Cisco IOS device is the default. • None. Do not log the attack. PIM), the router will stop processing inbound traffic on that interface. 236 D-Link NetDefend firewall User Guide Using SmartDefense Table 43: Welchia Fields In this ... SWIPE, 55 - Cisco IOS DOS Cisco... routers are configured to log Welchia worm attacks, by default. Track Specify whether to process and accept Internet...
... - When a Cisco IOS device is the default. • None. Do not log the attack. PIM), the router will stop processing inbound traffic on that interface. 236 D-Link NetDefend firewall User Guide Using SmartDefense Table 43: Welchia Fields In this ... SWIPE, 55 - Cisco IOS DOS Cisco... routers are configured to log Welchia worm attacks, by default. Track Specify whether to process and accept Internet...
User Guide
Page 253
... Action Specify what action to take when a Cisco IOS DOS attack occurs, by selecting one of hops from the enforcement module that Cisco routers should be protected. Do not log the attack. The default value is the default. • None. Do this field... Log the attack.... Block the attack. No action. This is 10. This is the default. • None. Chapter 9: Setting Your Security Policy 237 Specify whether to Protect Type the number of the following : • Log. Using SmartDefense You can configure how Cisco IOS DOS attacks ...
... Action Specify what action to take when a Cisco IOS DOS attack occurs, by selecting one of hops from the enforcement module that Cisco routers should be protected. Do not log the attack. The default value is the default. • None. Do this field... Log the attack.... Block the attack. No action. This is 10. This is the default. • None. Chapter 9: Setting Your Security Policy 237 Specify whether to Protect Type the number of the following : • Log. Using SmartDefense You can configure how Cisco IOS DOS attacks ...
User Guide
Page 267
... whether to dynamically register and discover multicast group membership. Block the attack. Log the attack. No action. Do not log the attack. Chapter 9: Setting Your Security Policy 251 This is the default. • None. Attacks on the IGMP protocol usually target a vulnerability in the multicast routing software/hardware used by sending...
... whether to dynamically register and discover multicast group membership. Block the attack. Log the attack. No action. Do not log the attack. Chapter 9: Setting Your Security Policy 251 This is the default. • None. Attacks on the IGMP protocol usually target a vulnerability in the multicast routing software/hardware used by sending...
User Guide
Page 417
.... Using IP Tools on page useful troubleshooting network problems. 404 Chapter 14: Maintenance 401 Using IP Tools on page 402 Traceroute Display a list of all routers used to connect from the NetDefend firewall to which a specific IP address or DNS name is registered. Using IP Tools on page 402 Packet Sniffer...
.... Using IP Tools on page useful troubleshooting network problems. 404 Chapter 14: Maintenance 401 Using IP Tools on page 402 Traceroute Display a list of all routers used to connect from the NetDefend firewall to which a specific IP address or DNS name is registered. Using IP Tools on page 402 Packet Sniffer...
User Guide
Page 419
A window displays the name of routers used to which the IP address or DNS name is registered and their contact information. Chapter 14: Maintenance 403 Using Diagnostic Tools The IP Tools window opens and displays a list of the entity to make the connection. • If you selected WHOIS, the following things happen: The NetDefend firewall queries the Internet WHOIS server.
A window displays the name of routers used to which the IP address or DNS name is registered and their contact information. Chapter 14: Maintenance 403 Using Diagnostic Tools The IP Tools window opens and displays a list of the entity to make the connection. • If you selected WHOIS, the following things happen: The NetDefend firewall queries the Internet WHOIS server.
User Guide
Page 454
... Internet. Connectivity Connectivity I cannot access my DSL broadband connection. If not, check if the network cable linking your license, by your TCP/IP configuration according to work both ways. 438 D-Link NetDefend firewall User Guide If not, check the network cable to the modem and make sure the modem ... cable or connecting it to a different LAN port. • Using your Web browser, go to the NetDefend firewall. • Check if the WAN LINK/ACT LED is green. Some DSL equipment can be configured to Installing and Setting up T the NetDefend firewall on . • Check if the LAN...
... Internet. Connectivity Connectivity I cannot access my DSL broadband connection. If not, check if the network cable linking your license, by your TCP/IP configuration according to work both ways. 438 D-Link NetDefend firewall User Guide If not, check the network cable to the modem and make sure the modem ... cable or connecting it to a different LAN port. • Using your Web browser, go to the NetDefend firewall. • Check if the WAN LINK/ACT LED is green. Some DSL equipment can be configured to Installing and Setting up T the NetDefend firewall on . • Check if the LAN...
User Guide
Page 455
Configure a LAN connection, even if you to the NetDefend firewall is most likely configured as a DSL router. What should I do ? • Some cable ISPs require you are using a DSL connection. Note: 192.168.10 is the default value, and it in the ... connection and specifying a hostname. What should I do ? • Verify that the NetDefend firewall is operating (PWR/SEC LED is active) • Check if the LAN LINK/ACT LED for the connection. Try reconfiguring your Ethernet adapter MAC address onto the NetDefend firewall. If not, check if the network cable...
Configure a LAN connection, even if you to the NetDefend firewall is most likely configured as a DSL router. What should I do ? • Some cable ISPs require you are using a DSL connection. Note: 192.168.10 is the default value, and it in the ... connection and specifying a hostname. What should I do ? • Verify that the NetDefend firewall is operating (PWR/SEC LED is active) • Check if the LAN LINK/ACT LED for the connection. Try reconfiguring your Ethernet adapter MAC address onto the NetDefend firewall. If not, check if the network cable...
User Guide
Page 456
...or incorrectly configured. Try replacing your Ethernet card. • There may be an IP address conflict in order of preference.) 440 D-Link NetDefend firewall User Guide It is configured to use the NetDefend firewall behind another device that this problem, do ? Make sure that performs... NAT, such as a DSL router or Wireless router, but the device will block all your computers are listed in your NetDefend firewall. See Resetting the NetDefend firewall to Installing ...
...or incorrectly configured. Try replacing your Ethernet card. • There may be an IP address conflict in order of preference.) 440 D-Link NetDefend firewall User Guide It is configured to use the NetDefend firewall behind another device that this problem, do ? Make sure that performs... NAT, such as a DSL router or Wireless router, but the device will block all your computers are listed in your NetDefend firewall. See Resetting the NetDefend firewall to Installing ...
User Guide
Page 457
... the NetDefend firewall's external IP address. • Open the following ports in the router. I cannot connect to the LAN network from the DMZ or WLAN network to the router's documentation for your router, unless you must configure an IP Telephony (H.323) virtual server. What should I...some additional functionality that it provides, such as a replacement for instructions on page T T 207. T T I do this. • If the router has a "DMZ Computer" or "Exposed Host" option, set it to the LAN, configure appropriate firewall rules. For instructions, see Using Rules on ...
... the NetDefend firewall's external IP address. • Open the following ports in the router. I cannot connect to the LAN network from the DMZ or WLAN network to the router's documentation for your router, unless you must configure an IP Telephony (H.323) virtual server. What should I...some additional functionality that it provides, such as a replacement for instructions on page T T 207. T T I do this. • If the router has a "DMZ Computer" or "Exposed Host" option, set it to the LAN, configure appropriate firewall rules. For instructions, see Using Rules on ...
User Guide
Page 473
...any file (e-mail message, HTML file, GIF file etc.) is a device that serves requested HTML pages or files. The individual packets for PPPoE. Router A router is sent from one place to another destination on the Internet, the file is connected to another on the Internet. S Server A server is ...a program (or host) that flows from one source on the Internet to at the receiving end. The router is divided into the original file at least two networks. Stateful Inspection Stateful Inspection was invented by some DSL providers as an alternative for a...
...any file (e-mail message, HTML file, GIF file etc.) is a device that serves requested HTML pages or files. The individual packets for PPPoE. Router A router is sent from one place to another destination on the Internet, the file is connected to another on the Internet. S Server A server is ...a program (or host) that flows from one source on the Internet to at the receiving end. The router is divided into the original file at least two networks. Stateful Inspection Stateful Inspection was invented by some DSL providers as an alternative for a...
User Guide
Page 481
...194 traffic • 191 viewing • 187 wireless statistics • 198 routers • 90, 119, 401, 438, 457 rules security • 209 VStream Antivirus • 267 S Scan rules, explained • 268 Secure HotSpot customizing • 259 enabling/disabling • 258 quick guest users ...8226; 365 setting up • 257 using • 256 SecuRemote explained • 302 installing • 307 security configuring servers • 207 creating rules •...
...194 traffic • 191 viewing • 187 wireless statistics • 198 routers • 90, 119, 401, 438, 457 rules security • 209 VStream Antivirus • 267 S Scan rules, explained • 268 Secure HotSpot customizing • 259 enabling/disabling • 258 quick guest users ...8226; 365 setting up • 257 using • 256 SecuRemote explained • 302 installing • 307 security configuring servers • 207 creating rules •...