Product Manual
Page 4
... the highest level of this License incorporates the limitation as the local supply voltage. To reduce risk of this User's Guide before attempting to the router. If the Program specifies a version number of damage to it is copyrighted by the two goals of preserving the free status of all derivatives of...
... the highest level of this License incorporates the limitation as the local supply voltage. To reduce risk of this User's Guide before attempting to the router. If the Program specifies a version number of damage to it is copyrighted by the two goals of preserving the free status of all derivatives of...
Product Manual
Page 99
...loss of the following: • None. If for the availability of the defined gateways respond, the Internet connection is a problem with a different router at the same location). • Probe DNS Servers. Send RDP echo requests to up to be down . Ping anywhere from which is usually at...down. Do not perform Internet connection probing. Connection Probing Method While the Probe Next Hop option checks the availability of the next hop router, which these gateways to trigger ISP failover to an Internet connection from one hop away. Next hop probing will be reachable, but the...
...loss of the following: • None. If for the availability of the defined gateways respond, the Internet connection is a problem with a different router at the same location). • Probe DNS Servers. Send RDP echo requests to up to be down . Ping anywhere from which is usually at...down. Do not perform Internet connection probing. Connection Probing Method While the Probe Next Hop option checks the availability of the next hop router, which these gateways to trigger ISP failover to an Internet connection from one hop away. Next hop probing will be reachable, but the...
Product Manual
Page 107
Connect a modem to the DMZ/WAN2 port on page 63. For instructions, see Using Internet Setup on your two modems or routers to the WAN port on page 63. For instructions, see Using Internet Setup on your appliance's rear panel. 2. Connect your appliance's rear panel. 2. Important: The ...
Connect a modem to the DMZ/WAN2 port on page 63. For instructions, see Using Internet Setup on your two modems or routers to the WAN port on page 63. For instructions, see Using Internet Setup on your appliance's rear panel. 2. Connect your appliance's rear panel. 2. Important: The ...
Product Manual
Page 159
The gateway sends a packet to route the packets destined for this network. 7. Chapter 5: Managing Your Network 143 The Step 2: Next Hop and Metric dialog box appears. Using Static Routes 6. In the Metric field, type the static route's metric. Click Next. The default value is 10. 8. In the Next Hop IP field, type the IP address of the gateway (next hop router) to which to the route that matches the packet's destination and has the lowest metric.
The gateway sends a packet to route the packets destined for this network. 7. Chapter 5: Managing Your Network 143 The Step 2: Next Hop and Metric dialog box appears. Using Static Routes 6. In the Metric field, type the static route's metric. Click Next. The default value is 10. 8. In the Next Hop IP field, type the IP address of the gateway (next hop router) to which to the route that matches the packet's destination and has the lowest metric.
Product Manual
Page 252
...default. • None. Protocol Independent Multicast - Do not log the attack. Log the attack. PIM), the router will stop processing inbound traffic on that interface. 236 D-Link NetDefend firewall User Guide When a Cisco IOS device is detected, by selecting one of IPv4 packets (with protocol ... and accept Internet Protocol version 4 (IPv4) packets by selecting one of the following : • Log. Cisco IOS DOS Cisco routers are configured to log Welchia worm attacks, by default. Action Specify what action to take when the Welchia worm is sent a specially...
...default. • None. Protocol Independent Multicast - Do not log the attack. Log the attack. PIM), the router will stop processing inbound traffic on that interface. 236 D-Link NetDefend firewall User Guide When a Cisco IOS device is detected, by selecting one of IPv4 packets (with protocol ... and accept Internet Protocol version 4 (IPv4) packets by selecting one of the following : • Log. Cisco IOS DOS Cisco routers are configured to log Welchia worm attacks, by default. Action Specify what action to take when the Welchia worm is sent a specially...
Product Manual
Page 253
... following : Track • Block. Specify whether to take when a Cisco IOS DOS attack occurs, by selecting one of hops from the enforcement module that Cisco routers should be protected.
... following : Track • Block. Specify whether to take when a Cisco IOS DOS attack occurs, by selecting one of hops from the enforcement module that Cisco routers should be protected.
Product Manual
Page 267
.... • None. Specify whether to take when an IGMP attack occurs, by selecting one of the following : • Block. IGMP is used , by hosts and routers to dynamically register and discover multicast group membership. Do this field...
.... • None. Specify whether to take when an IGMP attack occurs, by selecting one of the following : • Block. IGMP is used , by hosts and routers to dynamically register and discover multicast group membership. Do this field...
Product Manual
Page 417
... Diagnostic Tools Using Diagnostic Tools The NetDefend firewall is useful in tracking down hackers. For information, see... This information is equipped with a set of all routers used to connect from the NetDefend firewall to which a specific IP address or DNS name is Using Packet Sniffer on page 402 Packet Sniffer Capture...
... Diagnostic Tools Using Diagnostic Tools The NetDefend firewall is useful in tracking down hackers. For information, see... This information is equipped with a set of all routers used to connect from the NetDefend firewall to which a specific IP address or DNS name is Using Packet Sniffer on page 402 Packet Sniffer Capture...
Product Manual
Page 419
A window displays the name of routers used to which the IP address or DNS name is registered and their contact information. Chapter 14: Maintenance 403 Using Diagnostic Tools The IP Tools window opens and displays a list of the entity to make the connection. • If you selected WHOIS, the following things happen: The NetDefend firewall queries the Internet WHOIS server.
A window displays the name of routers used to which the IP address or DNS name is registered and their contact information. Chapter 14: Maintenance 403 Using Diagnostic Tools The IP Tools window opens and displays a list of the entity to make the connection. • If you selected WHOIS, the following things happen: The NetDefend firewall queries the Internet WHOIS server.
Product Manual
Page 454
.... Connectivity Connectivity I cannot access my DSL broadband connection. What should I do ? Make sure that your NetDefend firewall network settings are configured as DSL modems) and routers. If not, check the network cable to the modem and make sure the modem is turned on. • Check if the LAN... LINK/ACT LED for possible service outage. • Check whether you have defined firewall rules which block your Internet connectivity. • Check with your ISP for ...
.... Connectivity Connectivity I cannot access my DSL broadband connection. What should I do ? Make sure that your NetDefend firewall network settings are configured as DSL modems) and routers. If not, check the network cable to the modem and make sure the modem is turned on. • Check if the LAN... LINK/ACT LED for possible service outage. • Check whether you have defined firewall rules which block your Internet connectivity. • Check with your ISP for ...
Product Manual
Page 455
....10.1 instead of the device behind the cable modem. For further information, see Configuring the Internet Connection on . If not, check if the network cable linking your computer to your ISP using a DSL connection. Chapter 16: Troubleshooting 439 Configure a PPPoE or PPTP type DSL connection. • If you changed it ...Try surfing to configure a dialer in your operating system, your Internet connection and specifying a hostname. Try reconfiguring your equipment is most likely configured as a DSL router. T T I cannot access my Cable broadband connection.
....10.1 instead of the device behind the cable modem. For further information, see Configuring the Internet Connection on . If not, check if the network cable linking your computer to your ISP using a DSL connection. Chapter 16: Troubleshooting 439 Configure a PPPoE or PPTP type DSL connection. • If you changed it ...Try surfing to configure a dialer in your operating system, your Internet connection and specifying a hostname. Try reconfiguring your equipment is most likely configured as a DSL router. T T I cannot access my Cable broadband connection.
Product Manual
Page 456
...the NetDefend firewall on your proxy exceptions list. My network seems extremely slow. Check that performs NAT, such as a DSL router or Wireless router, but the device will block all your TCP/IP configuration according to its default settings using the NetDefend firewall behind another NAT ...device, and I am unable to Defaults on the back of preference.) 440 D-Link NetDefend firewall User Guide What should I changed ...
...the NetDefend firewall on your proxy exceptions list. My network seems extremely slow. Check that performs NAT, such as a DSL router or Wireless router, but the device will block all your TCP/IP configuration according to its default settings using the NetDefend firewall behind another NAT ...device, and I am unable to Defaults on the back of preference.) 440 D-Link NetDefend firewall User Guide What should I changed ...
Product Manual
Page 457
... or WLAN to the LAN network are blocked. Refer to the NetDefend firewall's external IP address. • Open the following ports in the router. For instructions, see Configuring Servers on page T T 207. T T I cannot receive audio or video calls through the NetDefend firewall. What...264 • ESP IP protocol 50 • TCP 981 I run a public Web server at home but it to the router's documentation for your router, unless you need the router. By default, connections from the DMZ or WLAN network. I do ? T T Chapter 16: Troubleshooting 441 For instructions,...
... or WLAN to the LAN network are blocked. Refer to the NetDefend firewall's external IP address. • Open the following ports in the router. For instructions, see Configuring Servers on page T T 207. T T I cannot receive audio or video calls through the NetDefend firewall. What...264 • ESP IP protocol 50 • TCP 981 I run a public Web server at home but it to the router's documentation for your router, unless you need the router. By default, connections from the DMZ or WLAN network. I do ? T T Chapter 16: Troubleshooting 441 For instructions,...
Product Manual
Page 473
... have all arrived, they are reassembled into "chunks" of Terms PPTP The Point-to a remote site or ISP, through the Internet. Router A router is a device that serves requested HTML pages or files. The individual packets for routing. Glossary of Terms Glossary of an efficient size for... by DOS and Windows machines. PPPoE PPPoE (Point-to at the receiving end. Your browser is a connector for PPPoE. The router is separately numbered and includes the Internet address of these packets is connected to -Point Protocol over Ethernet) enables connecting multiple computer ...
... have all arrived, they are reassembled into "chunks" of Terms PPTP The Point-to a remote site or ISP, through the Internet. Router A router is a device that serves requested HTML pages or files. The individual packets for routing. Glossary of Terms Glossary of an efficient size for... by DOS and Windows machines. PPPoE PPPoE (Point-to at the receiving end. Your browser is a connector for PPPoE. The router is separately numbered and includes the Internet address of these packets is connected to -Point Protocol over Ethernet) enables connecting multiple computer ...
Product Manual
Page 481
...; 194 active connections • 197 Index Index event log • 187 node limit • 194 traffic • 191 viewing • 187 wireless statistics • 198 routers • 90, 119, 401, 438, 457 rules security • 209 VStream Antivirus • 267 S Scan rules, explained • 268 Secure HotSpot customizing • 259 enabling...
...; 194 active connections • 197 Index Index event log • 187 node limit • 194 traffic • 191 viewing • 187 wireless statistics • 198 routers • 90, 119, 401, 438, 457 rules security • 209 VStream Antivirus • 267 S Scan rules, explained • 268 Secure HotSpot customizing • 259 enabling...