D-Link DFL-1100 Router Manual PDF (Setup & Configuration Guide)

Given below is full router user manual of D-Link DFL-1100 router model. You can also download this manual in PDF Format to read later on your computer.

Product user manuals come handy in case you want to know all functionalities of your device, troubleshooting, fist time configuration & setup and in many other situations.

Page 1 / 139
D-Link DFL-1100
Network Security Firewall
Manual
Building Networks for People
Ver. 1.01
2005/01/14
Page 2 / 139
2
Contents
Introduction
....................................................................................
7
Features and Benefits
...........................................................................
7
Introduction to Firewalls
........................................................................
7
Introduction to Local Area Networking
..................................................
8
LEDs & Physical Connections
...............................................................
9
Package Contents
...............................................................................
10
System Requirements
.........................................................................
10
Managing D-Link DFL-1100
.........................................................
11
Resetting the DFL1100
...............................................................................
11
Administration Settings
...............................................................
12
Administrative Access
.........................................................................
12
Add ping access to an interface
..................................................................
13
Add Admin access to an interface
...............................................................
13
Add Read-only access to an interface
........................................................
14
Enable SNMP access to an interface
.........................................................
14
System
..........................................................................................
15
Interfaces
............................................................................................
15
Change IP of the LAN, DMZ or ETH4 interface
..........................................
15
WAN Interface Settings – Using Static IP
...................................................
16
WAN Interface Settings – Using DHCP
......................................................
16
WAN Interface Settings – Using PPPoE
.....................................................
17
WAN Interface Settings – Using PPTP
.......................................................
18
WAN Interface Settings – Using BigPond
...................................................
19
Traffic Shaping
............................................................................................
19
MTU Configuration
......................................................................................
20
VLAN
...................................................................................................
21
Add a new VLAN
.........................................................................................
21
Remove a VLAN
.........................................................................................
21
Routing
................................................................................................
22
Add a new Static Route
...............................................................................
23
Remove a Static Route
...............................................................................
23
High Availability
...................................................................................
24
What High Availability will do for you
..........................................................
24
What High Availability will NOT do for you
..................................................
24
IP Addresses explained
..............................................................................
25
Page 3 / 139
The shared IP address and the failover mechanism
..................................
25
Cluster heartbeats
.......................................................................................
26
The synchronization interface
.....................................................................
26
Setting up a High Availability cluster
...........................................................
27
Interface Monitoring
....................................................................................
28
Logging
...............................................................................................
29
Enable Logging
...........................................................................................
30
Enable Audit Logging
..................................................................................
30
Enable E-mail alerting for ISD/IDP events
..................................................
30
Time
....................................................................................................
32
Changing time zone
....................................................................................
33
Using NTP to sync time
...............................................................................
33
Setting time and date manually
...................................................................
33
Firewall
..........................................................................................
34
Policy
...................................................................................................
34
Policy modes
...............................................................................................
34
Action Types
................................................................................................
34
Source and Destination Filter
......................................................................
35
Service Filter
...............................................................................................
35
Schedule
.....................................................................................................
35
Intrusion Detection / Prevention
..................................................................
35
Traffic Shaping
............................................................................................
36
Policy Routing
.............................................................................................
36
Add a new policy
.........................................................................................
38
Change order of policy
................................................................................
39
Delete policy
................................................................................................
39
Configure Intrusion Detection
.....................................................................
39
Configure Intrusion Prevention
...................................................................
40
Port mapping / Virtual Servers
............................................................
41
Add a new mapping
....................................................................................
41
Delete mapping
...........................................................................................
42
Administrative users
............................................................................
43
Add Administrative User
..............................................................................
43
Change Administrative User Access level
..................................................
44
Change Administrative User Password
.......................................................
44
Delete Administrative User
..........................................................................
45
Users
...................................................................................................
46
The DFL-1100 RADIUS Support
.................................................................
46
Enable User Authentication via HTTP / HTTPS
..........................................
47
Enable RADIUS Support
.............................................................................
47
Add User
.....................................................................................................
48
Change User Password
..............................................................................
48
Delete User
.................................................................................................
49
Schedules
...........................................................................................
50
Add new recurring schedule
.......................................................................
50
Page 4 / 139
4
Services
..............................................................................................
51
Adding TCP, UDP or TCP/UDP Service
......................................................
51
Adding IP Protocol
......................................................................................
52
Grouping Services
......................................................................................
52
Protocol-independent settings
....................................................................
53
VPN
.....................................................................................................
54
Introduction to IPSec
...................................................................................
54
Introduction to PPTP
...................................................................................
55
Introduction to L2TP
....................................................................................
55
Point-to-Point Protocol
................................................................................
55
Authentication Protocols
.............................................................................
56
PAP
...............................................................................................................
56
CHAP
............................................................................................................
56
MS-CHAP v1
................................................................................................
56
MS-CHAP v2
................................................................................................
56
MPPE, Microsoft Point-To-Point Encryption
................................................
56
L2TP/PPTP Clients
.....................................................................................
57
L2TP/PPTP Servers
....................................................................................
58
VPN between two networks
........................................................................
60
VPN between two networks
........................................................................
60
Creating a LAN-to-LAN IPSec VPN Tunnel
................................................
60
VPN between client and an internal network
..............................................
61
Creating a Roaming Users IPSec VPN Tunnel
...........................................
61
Adding a L2TP/PPTP VPN Client
...............................................................
62
Adding a L2TP/PPTP VPN Server
..............................................................
62
IPSec VPN – Advanced Settings
........................................................
63
Limit MTU
....................................................................................................
63
IKE Mode
....................................................................................................
63
IKE DH Group
.............................................................................................
63
PFS – Perfect Forward Secrecy
.................................................................
63
NAT Traversal
.............................................................................................
63
Keepalives
...................................................................................................
63
Proposal Lists
..............................................................................................
64
IKE Proposal List
.........................................................................................
64
IPSec Proposal List
.....................................................................................
64
Certificates
..........................................................................................
65
Trusting Certificates
....................................................................................
65
Local identities
............................................................................................
65
Certificates of remote peers
........................................................................
65
Certificate Authorities
..................................................................................
65
Identities
......................................................................................................
66
Content Filtering
..................................................................................
67
Edit the URL Global Whitelist
......................................................................
67
Page 5 / 139
Edit the URL Global Blacklist
......................................................................
68
Active content handling
...............................................................................
69
Servers
..........................................................................................
70
DHCP Server Settings
.........................................................................
70
Enable DHCP Server
..................................................................................
71
Enable DHCP Relay
....................................................................................
71
Disable DHCP Server/Relayer
....................................................................
71
DNS Relayer Settings
.........................................................................
72
Enable DNS Relayer
...................................................................................
72
Disable DNS Relayer
..................................................................................
73
Tools
..............................................................................................
74
Ping
.....................................................................................................
74
Ping Example
..............................................................................................
74
Dynamic DNS
......................................................................................
75
Add Dynamic DNS Settings
........................................................................
75
Backup
................................................................................................
76
Exporting the DFL-1100’s Configuration
.....................................................
76
Restoring the DFL-1100’s Configuration
.....................................................
76
Restart/Reset
......................................................................................
77
Restarting the DFL-1100
.............................................................................
77
Restoring system settings to factory defaults
.............................................
77
Upgrade
..............................................................................................
79
Upgrade Firmware
......................................................................................
79
Upgrade IDS Signature-database
...............................................................
79
Status
............................................................................................
80
System
................................................................................................
80
Interfaces
............................................................................................
81
HA
.......................................................................................................
82
VLAN
...................................................................................................
83
VPN
.....................................................................................................
84
Connections
........................................................................................
85
DHCP Server
......................................................................................
86
Users
...................................................................................................
87
How to read the logs
....................................................................
88
USAGE events
....................................................................................
88
DROP events
......................................................................................
88
CONN events
......................................................................................
88
Step by step guides
.....................................................................
90
LAN-to-LAN VPN using IPsec
.............................................................
91

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top