D-Link DFL-700 User Manual

Browse online or download User Manual for Networking D-Link DFL-700. D-Link DFL-700 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 141
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - D-Link DFL-700

D-Link DFL-700 Network Security Firewall Manual Building Networks for People Ver.1.02 (20050419)

Page 2 - Contents

10Package Contents Contents of Package: • D-Link DFL-700 Firewall • Manual and CD • Quick Installation Guide • AC Power adapter Note: Using a pow

Page 3

100 5. Add a new user, Firewall->Users: Under Users in local database click Add new Name the new user BranchOffice Enter password: 12345678

Page 4

A more secure LAN-to-LAN VPN solution Go get a more secure solution, policies should be created instead of allowing all traffic between the two offic

Page 5

102 4. Setup the new rule: Name the new rule: allow_pop3 Select action: Allow Select service: pop3 Select schedule: Always We don’t want any Intrusi

Page 6

5. The first policy rule is now created. Repeat step 4 to create services named allow_imap, allow_ftp and allow_http. The services for these polici

Page 7 - Introduction

104Settings for Main office 1. Setup policies for the new tunnel, Firewall->Policy: Click Global policy parameters Disable Allow all VPN traffic:

Page 8

Windows XP client and PPTP server Settings for the Windows XP client 1. Open the control panel (Start button -> Control panel). 2. If you are usi

Page 9 - Physical Connections

106 5. Select Connect to the network at my workplace and click Next

Page 10 - System Requirements

6. Select Virtual Private Network connection and click Next

Page 11 - Managing D-Link DFL-700

108 7. Name the connection MainOffice and click Next

Page 12 - Administration Settings

8. Select Do not dial the initial connection and click Next

Page 13

Managing D-Link DFL-700 When a change is done to the configuration a new icon named Activate Changes will appear. When all changes and administrator w

Page 14

110 9. Type the IP address to the server, 194.0.2.20, and click Next 10. Click Finish

Page 15 - Interfaces

11. Type user name HomeUser and password 1234567890 (Note! You should use a password that is hard to guess) 12. Click Properties

Page 16

112 13. Select the Networking tab and change Type of VPN to PPTP VPN. Click OK. All settings needed for the XP client is now done. When we have set u

Page 17

Settings for Main office 1. Setup interfaces, System->Interfaces: WAN IP:193.0.2.20 LAN IP: 192.168.1.1, Subnet mask: 255.255.255.0 2. Setup PP

Page 18 - Username – The login or

114Leave static client IP empty (could also be set to eg 192.168.1.200. If no IP is set here the IP pool from the PPTP server settings are used). Cl

Page 19 - Traffic Shaping

Windows XP client and L2TP server The Windows XP client to L2TP server setup is quite similar to the PPTP setup above. Settings for the Windows XP cl

Page 20 - MTU Configuration

1162. Select the Security tab and click IPsec Settings 3. Check Use pre-shared key for authentication, type the key and click OK

Page 21 - Routing

Settings for Main office 1. Setup interfaces, System->Interfaces: WAN IP:193.0.2.20 LAN IP: 192.168.1.1, Subnet mask: 255.255.255.0 2. Setup L2

Page 22 - Remove a Static Route

118Leave static client IP empty (could also be set to eg 192.168.1.200. If no IP is set here the IP pool from the PPTP server settings are used). Cl

Page 23 - Logging

Content filtering To enable content filtering, follow these steps: 1. Update the content filtering settings, Firewall->Content Filtering: Select

Page 24 - Enable Audit Logging

12Administration Settings Administrative Access Ping – If enabled, specifies who can ping the interface IP of the DFL-700. Default if enabled is to

Page 25

1202. Make sure the http-outbound service exists and is using the HTTP ALG, Firewall->Services: Find the http-outbound service in the list and cl

Page 26

4. Edit the new policy we just created Name the rule allow_http Enter position 2 Select action Allow Select service http-outbound Select sche

Page 27 - Using NTP to sync time

122 The new policy should now be added to position two in the list (if not, it can be moved to the right position by clicking on the up and down arro

Page 28 - Firewall

Intrusion detection and prevention Intrusion detection and prevention can be enabled for both policies and port mappings. In this example we are usi

Page 29 - Schedule

1242. Set up the newly created port mapping: Name the rule map_www Select service http-in-all Enter pass to IP: 192.168.2.5 (the IP of the web s

Page 30

The new mapping is now in the list. 3. Setup email server and enable alerting, System->Logging: Check Enable E-mail alerting for IDS/IDP events

Page 31 - Add a new policy

126 Traffic shaping In these examples we assume that the WAN port of the firewall is connected to Internet with an up and downstream bandwidth of 2 m

Page 32 - Delete policy

Now all FTP traffic from 192.168.1.125 on the LAN network will be limited to 400kbit/s in both directions. If more than one IP is required, a comma-s

Page 33

128Select service: ftp_outbound Schedule should be always Check the Traffic shaping box and enter 1000 as up and downstream guarantee. Click Apply

Page 34 - Add a new mapping

Appendixes Appendix A: ICMP Types and Codes The Internet Control Message Protocol (ICMP) has many messages that are identified by a “type” field; many

Page 35 - Delete mapping

Add ping access to an interface To add ping access click on the interface you would like to add it to. Follow these steps to add ping access to an int

Page 36 - Administrative users

130 1 Redirect Datagram for the Host RFC792 2 Redirect Datagram for the Type of Service and Network RFC792 3 Redirect Datagram for the Typ

Page 37

Appendix B: Common IP Protocol Numbers These are some of the more common IP Protocols, for all follow the link after the table. Decimal Keyword Desc

Page 38 - Delete Administrative User

132LIMITED WARRANTY D-Link provides this limited warranty for its product only to the person or entity who originally purchased the product from D-Li

Page 39 - The DFL-700 RADIUS Support

Registration Card. The Registration Card provided at the back of this manual must be completed and returned to an Authorized D-Link Service Office for

Page 40 - Enable RADIUS Support

134PRODUCT RETURNED TO D-LINK FOR WARRANTY SERVICE) RESULTING FROM THE USE OF THE PRODUCT, RELATING TO WARRANTY SERVICE, OR ARISING OUT OF ANY BREACH

Page 41 - Change User Password

Somit stellen Sie die Betriebssicherheit des Gerätes sicher. 18. Zum Netzanschluß dieses Gerätes ist eine geprüfte Leitung zu verwenden, Für einen Nen

Page 42 - Delete User

136-Consult the dealer or an experienced radio/ TV technician for help. VCCI Warning

Page 43 - Schedules

Offices AUSTRALIA D-LINK AUSTRALIA 1 Giffnock Ave,North Ryde, NSW 2113, Australia TEL: 61-2-8899-1800 FAX: 61-2-8899-1868 TOLL FREE: 1800-177-100

Page 44 - Services

138Tel /fax +7 (095) 744-00-99 mailto:[email protected] , Web: www.dlink.ru SINGAPORE D-LINK INTERNATIONAL 1 International Business Park, #03-12 The

Page 46

14Add Read-only access to an interface To add read-only access click on the interface you would like to add it to, note that if you only have read-on

Page 49 - Authentication Protocols

System Interfaces Click on System in the menu bar, and then click interfaces below it. Change IP of the LAN or DMZ interface Follow these steps to cha

Page 50 - L2TP/PPTP Clients

16WAN Interface Settings – Using Static IP If you are using Static IP you have to fill in the IP address information provided to you by your ISP. All

Page 51 - L2TP/PPTP Servers

WAN Interface Settings – Using PPPoE Use the following procedure to configure the DFL-700 external interface to use PPPoE (Point-to-Point Protocol ove

Page 52

18WAN Interface Settings – Using PPTP PPTP over Ethernet connections are used in some DSL and cable modem networks. You need your account details, an

Page 53 - VPN between two networks

WAN Interface Settings – Using BigPond The ISP Telstra BigPond uses BigPond for authentication; the IP is assigned with DHCP. • Username – The login

Page 54

2Contents Introduction ... 7 Features and Benefits ...

Page 55

20MTU Configuration To improve the performance of your Internet connection, you can adjust the maximum transmission unit (MTU) of the packets that t

Page 56 - VPN – Advanced Settings

Routing Click on System in the menu bar, and then click Routing below it, this will give a list of all configured routes, it will look something like

Page 57 - IPSec Proposal List

22Add a new Static Route Follow these steps to add a new route. Step 1. Go to System and Routing. Step 2. Click on Add new in the bottom of the routi

Page 58 - Certificates

Logging Click on System in the menu bar, and then click Logging below it. Logging, the ability to audit decisions made by the firewall, is a vital pa

Page 59 - Identities

24configurable. It’s also possible to have E-mail alerting for IDS/IDP events to up to three email addresses. Enable Logging Follow these steps to en

Page 60 - Content Filtering

Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the rules. For more information about how to enable intrusion

Page 61

26Time Click on System in the menu bar, and then click Time below it. This will give you the option to either set the system time by syncing to an I

Page 62

Changing time zone Follow these steps to change the time zone. Step 1. Choose the correct time zone in the drop down menu. Step 2. Specify your daylig

Page 63 - Active content handling

28Firewall Policy The Firewall Policy configuration section is the "heart" of the firewall. The policies are the primary filter that is con

Page 64 - Servers

Source and Destination Filter Source Nets – Specifies the sender span of IP addresses to be compared to the received packet. Leave this blank to match

Page 65 - Disable DHCP Server/Relayer

Setting time and date manually ...27 Firewall ...

Page 66 - DNS Relayer Settings

30the system administrators if email alerting is converted. There are two modes that can be configured, either Inspection Only or Prevention. Inspect

Page 67 - Disable DNS Relayer

Add a new policy Follow these steps to add a new outgoing policy. Step 1. Choose the LAN->WAN policy list from the available policy lists. Step 2.

Page 68 - Ping Example

32Change order of policy Follow these steps to change order of a policy. Step 1. Choose the policy list you would like do change order in from the av

Page 69 - Dynamic DNS

Configure Intrusion Prevention Follow these steps to configure IDP on a policy. Step 1. Choose the policy you would like have IDP on. Step 2. Click on

Page 70

34Port mapping / Virtual Servers The Port mapping / Virtual Servers configuration section is where you can configure virtual servers like Web servers

Page 71 - Restart/Reset

Delete mapping Follow these steps to delete a mapping. Step 1. Choose the mapping list (WAN, LAN or DMZ) you would like do delete the mapping from. St

Page 72

36Administrative users Click on Firewall in the menu bar, and then click Users below it. This will show all the users, and the first section is the

Page 73 - Upgrade

Change Administrative User Access level To change the access lever of a user click on the user name and you will see the following screen. From here y

Page 74

38Delete Administrative User To delete a user click on the user name and you will see the following screen. Follow these steps to delete an Administ

Page 75

Users User Authentication allows an administrator to grant or reject access to specific users from specific IP addresses, based on their user credenti

Page 76

4MS-CHAP v1 ...49 MS-CHAP v2 ...

Page 77 - Connections

40Enable User Authentication via HTTP / HTTPS Follow these steps to enable User Authentication. Step 1. Enable the checkbox for User Authentication.

Page 78 - DHCP Server

Add User Follow these steps to add a new user. Step 1. Click on add after the type of user you would like to add, Admin or Read-only. Step 2. Fill in

Page 79

42Delete User To delete a user click on the user name and you will see the following screen. Follow these steps to delete a user. Step 1. Click on t

Page 80 - How to read the logs

Schedules It is possible to configure a schedule for policies to take affect. By creating a schedule, the DFL-700 is allowing the firewall policies

Page 81

44Services A service is basically a definition of a specific IP protocol with corresponding parameters. The service http, for instance, is defined as

Page 82 - Step by step guides

Adding IP Protocol When the type of the service is IP Protocol, an IP protocol number may be specified in the text field. To have the service match th

Page 83 - LAN-to-LAN VPN using IPsec

46Protocol-independent settings Allow ICMP errors from the destination to the source – ICMP error messages are sent in several situations: for exampl

Page 84

VPN Introduction to IPsec This chapter introduces IPsec, the method, or rather set of methods used to provide VPN functionality. IPSec, Internet Proto

Page 85

48Introduction to PPTP PPTP, Point-to-Point Tunneling Protocol, is used to provide IP security at the network layer. A PPTP based VPN is made up by t

Page 86

Authentication Protocols PPP supports different authentication protocols, PAP, CHAP, MS-CHAP v1 and MS-CHAP v2 is supported. Which authentication prot

Page 87 - LAN-to-LAN VPN using PPTP

Ping ... 68 Ping Example...

Page 88

50L2TP/PPTP Clients General parameters Name – Specifies a name for the PPTP/L2TP Client. Username - Specify the username to use for this PPTP/L2TP Cl

Page 89

L2TP/PPTP Servers Name – Specifies a name for this PPTP/L2TP Server. Outer IP - Specifies the IP that the PPTP/L2TP server should listen on, leave it

Page 90

52 MPPE encryption If MPPE encryption is going to be used, this is where the encryption level is configured. If L2TP or PPTP over IPSec is going to b

Page 91

VPN between two networks In the following example users on the main office internal network can connect to the branch office internal network vice ver

Page 92

54VPN between client and an internal network In the following example users can connect to the main office internal network from anywhere on the Inte

Page 93

Adding a L2TP/PPTP VPN Client Follow these steps to add a L2TP or PPTP VPN Client configuration. Step 1. Go to Firewall and VPN and choose Add new PPT

Page 94 - LAN-to-LAN VPN using L2TP

56VPN – Advanced Settings Advanced settings for a VPN tunnel is used when one need change some characteristics of the tunnel when using for example t

Page 95

Proposal Lists To agree on the VPN connection parameters, a negotiation process is performed. As the result of the negotiations, the IKE and IPSec sec

Page 96

58Certificates A certificate is a digital proof of identity. It links an identity to a public key in a trustworthy manner. Certificates can be used t

Page 97

Certificate Authorities This is a list of all CA certificates. To add a new Certificate Authority certificate, click Add new. The following pages will

Page 98

6Settings for the Windows XP client ...105 Settings for Main office ...

Page 99

60Content Filtering DFL-700 HTTP content filtering can be configured to scan all HTTP content protocol streams for URLs or for web page content. You

Page 100

Edit the URL Global Whitelist Follow these steps to add or remove a url. Step 1. Go to Firewall and Content Filtering and choose Edit global URL whit

Page 101 - Settings for Branch office

62Edit the URL Global Blacklist Follow these steps to add or remove a url. Step 1. Go to Firewall and Content Filtering and choose Edit global URL b

Page 102

Active content handling Active content handling can be enabled or disabled by checking the checkbox before each type you would like to strip. For exam

Page 103

64Servers DHCP Server Settings The DFL-700 contains a DHCP server; DHCP (Dynamic Host Configuration Protocol) is a protocol that lets network adminis

Page 104 - Settings for Main office

Enable DHCP Server To enable the DHCP Server on an interface, click on Servers in the menu bar, and then click DHCP Server below it. Follow these step

Page 105

66DNS Relayer Settings Click on Servers in the menu bar, and then click DNS Relay below it. The DFL-700 contains a DNS relayer that you can be config

Page 106

Disable DNS Relayer Follow these steps to disable the DNS Relayer. Step 1. Disable by un-checking the Enable DNS Relayer box. Click the Apply button b

Page 107

68Tools Ping Click on Tools in the menu bar, and then click Ping below it. This tool is used to send a specified number of ICMP Echo Request packets

Page 108

Dynamic DNS The Dynamic DNS (require Dynamic DNS Service) allows you to alias a dynamic IP address to a static hostname, allowing your device to be m

Page 109

Introduction The DFL-700 provides three 10/100M Ethernet network interface ports, which are (1) Internal/LAN, (1) External/WAN, and (1) DMZ port. It a

Page 110 - 10. Click Finish

70Backup Click on Tools in the menu bar, and then click Backup below it. Here a administrator can backup and restore the configuration. The configur

Page 111 - 12. Click Properties

Restart/Reset Restarting the DFL-700 Follow these steps restart the DFL-700. Step 1. Choose if you want to do a quick or full restart. Step 2. Click R

Page 112

72Step 1. Under the Tools menu and the Reset section, click on the Reset to Factory Defaults button. Step 2. Click OK in the dialog to reset the un

Page 113

Upgrade The DFL-700’s software, IDS signatures and system parameters are all stored on a flash memory card. The flash memory card is re-writable and r

Page 114

74Status In this section, the DFL-700 displays the status information about the Firewall. Administrator may use Status to check the System Status, In

Page 115

Interfaces Click on Status in the menu bar, and then click Interfaces below it. A window will appear providing information about the interfaces in the

Page 116

76VPN Click on Status in the menu bar, and then click Interfaces below it. A window will appear providing information about the VPN connections done

Page 117

Connections Click on Status in the menu bar, and then click Connections below it. A window will appear providing information about the content of the

Page 118

78DHCP Server Click on Status in the menu bar, and then click DHCP Server below it. A window will appear providing information about the configured D

Page 119 - Content filtering

Users Click on Status in the menu bar, and then click Users below it. A window will appear providing user information. Currently authenticated users

Page 120

8Introduction to Local Area Networking Local Area Networking (LAN) is the term used when connecting several computers together over a small area such

Page 121

80How to read the logs Although the exact format of each log entry depends on how your syslog recipient works, most are very much alike. The way in w

Page 122

One event will be generated when a connection is established. This event will include information about protocol, receiving interface, source IP addre

Page 123

82Step by step guides In the following guides example IPs, users, sites and passwords are used. You will have to exchange the IP addresses and sites

Page 124

LAN-to-LAN VPN using IPsec Settings for Branch office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.10 LAN IP: 192.168.4.1, Subnet ma

Page 125

84 Retype PSK: 1234567890 Select Tunnel type: LAN-to-LAN tunnel Remote Net: 192.168.1.0/24 Remote Gateway: 194.0.2.20 Enable Automatically a

Page 126 - Traffic shaping

4. Click Activate and wait for the firewall to restart Settings for Main office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.20 L

Page 127

86 Select Tunnel type: LAN-to-LAN tunnel Remote Net: 192.168.4.0/24 Remote Gateway: 194.0.2.10 Enable “Automatically add a route for the remo

Page 128

LAN-to-LAN VPN using PPTP Settings for Branch office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.10 LAN IP: 192.168.4.1, Subnet ma

Page 129 - Appendixes

88 Username: BranchOffice Password: 1234567890 (Note! You should use a password that is hard to guess) Retype password: 1234567890 Interface

Page 130

Under MPPE encryption 128 bit should be the only checked option. Leave Use IPsec encryption unchecked Click Apply 3. Setup policies for the new tunn

Page 131

LEDs Power: A solid light indicates a proper connection to the power supply. Status: System status indicators, flashes to indicate an active system.

Page 132 - LIMITED WARRANTY

90Settings for Main office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.20 LAN IP: 192.168.1.1, Subnet mask: 255.255.255.0 2. Setu

Page 133 - What Is Not Covered:

Under authentication MSCHAPv2 should be the only checked option. Under MPPE encryption 128 bit should be the only checked option. Leave Use IPsec enc

Page 134

924. Set up authentication source, Firewall->Users: Select Local database Click Apply 5. Add a new user, Firewall->Users: Under Users in

Page 135

Click Apply 6. Click Activate and wait for the firewall to restart. This example will allow all traffic between the two offices. To get a more secu

Page 136

94LAN-to-LAN VPN using L2TP Settings for Branch office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.10 LAN IP: 192.168.4.1, Subnet

Page 137 - Offices

Username: BranchOffice Password: 1234567890 (Note! You should use a password that is hard to guess) Retype password: 1234567890 Interface IP:

Page 138

96 Under MPPE encryption only None should be checked Check Use IPsec encryption Enter key 1234567890 (Note! You should use a key that is hard to gues

Page 139

4. Click Activate and wait for the firewall to restart Settings for Main office 1. Setup interfaces, System->Interfaces: WAN IP: 193.0.2.20 LAN

Page 140

98 Leave WINS settings blank Under authentication MSCHAPv2 should be the only checked option. Under MPPE encryption None should be the only checke

Page 141

3. Setup policies for the new tunnel, Firewall->Policy: Click Global policy parameters Enable Allow all VPN traffic: internal->VPN, VPN->

Comments to this Manuals

No comments