Product Manual
Page 2
... to Firewalls 7 Introduction to Local Area Networking 8 LEDs & Physical Connections 9 Package Contents 10 System Requirements 10 Managing D-Link DFL-1100 11 Resetting the DFL-1100 11 Administration Settings 12 Administrative Access 12 Add ping access to an interface 13 Add Admin access to an interface 13 Add...ETH4 interface 15 WAN Interface Settings - Using DHCP 16 WAN Interface Settings - Using PPPoE 17 WAN Interface Settings - Using BigPond 20 Traffic Shaping 20 MTU Configuration 21 VLAN 22 Add a new VLAN 22 Remove a VLAN 22 Routing 23 Add a new Static Route 24 ...
... to Firewalls 7 Introduction to Local Area Networking 8 LEDs & Physical Connections 9 Package Contents 10 System Requirements 10 Managing D-Link DFL-1100 11 Resetting the DFL-1100 11 Administration Settings 12 Administrative Access 12 Add ping access to an interface 13 Add Admin access to an interface 13 Add...ETH4 interface 15 WAN Interface Settings - Using DHCP 16 WAN Interface Settings - Using PPPoE 17 WAN Interface Settings - Using BigPond 20 Traffic Shaping 20 MTU Configuration 21 VLAN 22 Add a new VLAN 22 Remove a VLAN 22 Routing 23 Add a new Static Route 24 ...
Product Manual
Page 3
... 34 Policy modes 34 Action Types 34 Source and Destination Filter 35 Service Filter 35 Schedule ...35 Intrusion Detection / Prevention 36 Traffic Shaping 36 Policy Routing 36 Add a new policy 37 Change order of policy 38 Delete policy 38 Configure Intrusion Detection 38 Configure Intrusion...Add Administrative User 42 Change Administrative User Access level 43 Change Administrative User Password 43 Delete Administrative User 44 Users 45 The DFL-1100 RADIUS Support 45 Enable User Authentication via HTTP / HTTPS 46 Enable RADIUS Support 46 Add User ...47 Change User Password 47...
... 34 Policy modes 34 Action Types 34 Source and Destination Filter 35 Service Filter 35 Schedule ...35 Intrusion Detection / Prevention 36 Traffic Shaping 36 Policy Routing 36 Add a new policy 37 Change order of policy 38 Delete policy 38 Configure Intrusion Detection 38 Configure Intrusion...Add Administrative User 42 Change Administrative User Access level 43 Change Administrative User Password 43 Delete Administrative User 44 Users 45 The DFL-1100 RADIUS Support 45 Enable User Authentication via HTTP / HTTPS 46 Enable RADIUS Support 46 Add User ...47 Change User Password 47...
Product Manual
Page 20
...control whichever policies have the highest priority when large amounts of data are moving through the firewall for a policy. Traffic Shaping When Traffic Shaping is enabled and the correct maximum up and downstream bandwidth is enough bandwidth available for most employees' computers. higher then...uses BigPond for more important services. You can also use traffic shaping to you by your ISP. Limit bandwidth to limit the amount of bandwidth available through the DFL-1100. You can use traffic shaping to keep less important services from using bandwidth needed for authentication...
...control whichever policies have the highest priority when large amounts of data are moving through the firewall for a policy. Traffic Shaping When Traffic Shaping is enabled and the correct maximum up and downstream bandwidth is enough bandwidth available for most employees' computers. higher then...uses BigPond for more important services. You can also use traffic shaping to you by your ISP. Limit bandwidth to limit the amount of bandwidth available through the DFL-1100. You can use traffic shaping to keep less important services from using bandwidth needed for authentication...
Product Manual
Page 34
...mode for the firewall. The policies also regulate how bandwidth management, traffic shaping, is carried out if audit logging has been enabled in the ...DFL-1100 network address translation to accept or deny connections between networks without performing address translation. The Action of the internal and DMZ networks from public networks. Therefore, rules for return traffic... will immediately be logged if logging has been enabled in the Logging Settings page. Policy modes The first step in NAT or No NAT (Route) mode. In NAT mode, you can run in configuring security...
...mode for the firewall. The policies also regulate how bandwidth management, traffic shaping, is carried out if audit logging has been enabled in the ...DFL-1100 network address translation to accept or deny connections between networks without performing address translation. The Action of the internal and DMZ networks from public networks. Therefore, rules for return traffic... will immediately be logged if logging has been enabled in the Logging Settings page. Policy modes The first step in NAT or No NAT (Route) mode. In NAT mode, you can run in configuring security...
Product Manual
Page 36
...the WAN interface this also for it will only work . 36 D-Link updates the attack database periodically. Traffic shaping works by traffic using limit; By using a policy a minimum bandwidth, this policy. Policy Routing Normal routing can traffic using Guarantee, you have precedence. the "policy" is the routing ...IP address of the malicious attack, the IDS will protect the networks behind the DFL-1100 by limiting the inbound and outbound traffic to obtain quality of service in a network, seen from a security as well as policy based routing, is, simply put, an extension of what...
...the WAN interface this also for it will only work . 36 D-Link updates the attack database periodically. Traffic shaping works by traffic using limit; By using a policy a minimum bandwidth, this policy. Policy Routing Normal routing can traffic using Guarantee, you have precedence. the "policy" is the routing ...IP address of the malicious attack, the IDS will protect the networks behind the DFL-1100 by limiting the inbound and outbound traffic to obtain quality of service in a network, seen from a security as well as policy based routing, is, simply put, an extension of what...
Product Manual
Page 37
...This name is no need for authentication for details on the Add new link. Leave this blank to match everything . Leave this blank to match everything...was just another router. Destination Nets: Specifies the span of IP addresses to be compared to drop all traffic matching the criteria of the received packet. If not, skip this policy to Internal Servers. Choose the LAN... in transparent squid-proxy setups. Choose Always for the rule. If using Traffic shaping, fill in the following values: Name: Specifies a symbolic name for no need for authentication for the policy.
...This name is no need for authentication for details on the Add new link. Leave this blank to match everything . Leave this blank to match everything...was just another router. Destination Nets: Specifies the span of IP addresses to be compared to drop all traffic matching the criteria of the received packet. If not, skip this policy to Internal Servers. Choose the LAN... in transparent squid-proxy setups. Choose Always for the rule. If using Traffic shaping, fill in the following values: Name: Specifies a symbolic name for no need for authentication for the policy.
Product Manual
Page 40
...authentication for easy reference in the same way as with policies. Add a new mapping Follow these steps to match. Click on the Add new link. Step 2. This name is used for details on mapping Public IP addresses to the LAN or DMZ. Destination IP: Leave empty to use ... or click Cancel to the specified Pass To address. Mappings are applied in the policy list. One may also regulate how bandwidth management (traffic shaping) is applied to traffic flowing through the WAN. See the previous chapter for the rule. Step 1. Fill in the required information. Note: Refer to Appendix C...
...authentication for easy reference in the same way as with policies. Add a new mapping Follow these steps to match. Click on the Add new link. Step 2. This name is used for details on mapping Public IP addresses to the LAN or DMZ. Destination IP: Leave empty to use ... or click Cancel to the specified Pass To address. Mappings are applied in the policy list. One may also regulate how bandwidth management (traffic shaping) is applied to traffic flowing through the WAN. See the previous chapter for the rule. Step 1. Fill in the required information. Note: Refer to Appendix C...