Page 6 / 139 Scroll up to view Page 1 - 5
6
Settings for Branch office
.............................................................................
91
Settings for Main office
.................................................................................
93
LAN-to-LAN VPN using PPTP
............................................................
95
Settings for Branch office
.............................................................................
95
Settings for Main office
.................................................................................
98
LAN-to-LAN VPN using L2TP
...........................................................
102
Settings for Branch office
...........................................................................
102
Settings for Main office
...............................................................................
105
A more secure LAN-to-LAN VPN solution
.........................................
109
Settings for Branch office
...........................................................................
109
Settings for Main office
...............................................................................
112
Windows XP client and PPTP server
.................................................
113
Settings for the Windows XP client
............................................................
113
Settings for Main office
...............................................................................
121
Windows XP client and L2TP server
.................................................
123
Settings for the Windows XP client
............................................................
123
Settings for Main office
...............................................................................
125
Content filtering
.................................................................................
127
Intrusion detection and prevention
....................................................
131
Traffic shaping
...................................................................................
134
Limit bandwidth to a service
.......................................................................
134
Limit bandwidth to one or more IP addresses
............................................
134
Guarantee bandwidth to a service
..............................................................
135
Appendixes
.................................................................................
137
Appendix A: ICMP Types and Codes
................................................
137
Appendix B: Common IP Protocol Numbers
.....................................
139
Page 7 / 139
Introduction
The DFL-1100 provides four 10/100MB Ethernet network interface ports, which are (1)
Internal/LAN, (1) External/WAN, (1) DMZ port and (1) port that can be configured as High
Availability Sync port or as ETH4 port. It also provides easily operated software WebUI that
allows users to set system parameters or monitor network activities using a web browser.
Features and Benefits
z
Firewall Security
z
VPN Server/Client Supported
z
Content Filtering
z
High Availability
z
Bandwidth Management
DFL-1100 features an extensive Traffic Shaper for bandwidth
management.
z
Web Management
Configurable through any networked computer’s web browser using
Netscape or Internet Explorer.
z
Access Control supported
Allows you to assign different access rights for different users. Like
Admin or Read-Only User.
Introduction to Firewalls
A firewall is a device that sits between your computer and the Internet that prevents
unauthorized access to or from your network. A firewall can be a computer using firewall
software or a special piece of hardware built specifically to act as a firewall. In most
circumstances, a firewall is used to prevent unauthorized Internet users from accessing
private networks or corporate LAN’s and Intranets.
A firewall watches all of the information moving to and from your network and analyzes
each piece of data. Each piece of data is checked against a set of criteria that the
administrator configures. If any data does not meet the criteria, that data is blocked and
discarded. If the data meets the criteria, the data is passed through. This method is called
packet filtering.
A firewall can also run specific security functions based on the type of application or type
of port that is being used. For example, a firewall can be configured to work with an FTP or
Telnet server. Or a firewall can be configured to work with specific UDP or TCP ports to allow
certain applications or games to work properly over the Internet.
Page 8 / 139
8
Introduction to Local Area Networking
Local Area Networking (LAN) is the term used when connecting several computers
together over a small area such as a building or group of buildings. LAN’s can be connected
over large areas. A collection of LAN’s connected over a large area is called a Wide Area
Network (WAN).
A LAN consists of multiple computers connected to each other. There are many types of
media that can connect computers together. The most common media is CAT5 cable (UTP or
STP twisted pair wire.) On the other hand, wireless networks do not use wires; instead they
communicate over radio waves. Each computer must have a Network Interface Card (NIC),
which communicates the data between computers. A NIC is usually a 10Mbps network card, a
10/100Mbps network card or a wireless network card.
Most networks use hardware devices such as hubs or switches that each cable can be
connected to in order to continue the connection between computers. A hub simply takes any
data arriving through each port and forwards the data to all other ports. A switch is more
sophisticated, in that a switch can determine the destination port for a specific piece of data.
A switch minimizes network traffic overhead and speeds up the communication over a
network.
Networks take some time in order to plan and implement correctly. There are many ways
to configure your network.
You may want to take some time to determine the best network
set-up for your needs.
Page 9 / 139
LEDs & Physical Connections
WAN, LAN, DMZ & ETH4/Sync:
Ethernet Link port indicators, Green. The Act LED
flickers when the ports are sending or receiving data.
Power:
A solid light indicates a proper connection to the power supply.
Status:
System status indicators, flashes to indicate an active system. If the LED has a
solid light the unit is defective.
Console:
Serial access to the firewall software, 9600, 8bit, None Parity, 1Stop bit.
External Port (WAN):
Use this port to connect to the external router, DSL modem, or
Cable modem.
Internal Ports (LAN):
Use this port to connect to the internal network of the office.
DMZ Port:
Use this port to connect to the company’s server(s), which needs direct
connection to the Internet (FTP, SNMP, HTTP and DNS).
ETH4/Sync Port:
Use this port to as an extra LAN or DMZ port, or when using High
Availability as Sync interface.
Page 10 / 139
10
Package Contents
Contents of Package:
D-Link DFL-1100 Firewall
Manual and CD
Quick Installation Guide
Power cord
If any of the above items are missing, please contact your reseller.
System Requirements
Computer with a Windows, Macintosh, or Unix based operating system with an
installed Ethernet adapter
Internet Explorer or Netscape Navigator, version 6.0 or above, with JavaScript
enabled.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top