Page 21 / 133 Scroll up to view Page 16 - 20
Add a new Static Route
Follow these steps to add a new route.
Step 1.
Go to
System
and
Routing
.
Step 2.
Click on
Add new
in the bottom of the routing table.
Step 3.
Choose the interface that the route should be sent trough from the dropdown
menu.
Step 4.
Specify the Network and Subnet mask.
Step 5.
If this network is behind a remote gateway enable the checkbox
Network is
behind remote gateway
and specify the IP of that gateway
Click the
Apply
button below to apply the setting or click
Cancel
to discard changes.
Remove a Static Route
Follow these steps to add a remove a route.
Step 1.
Go to
System
and
Routing
.
Step 2.
Take
Edit
after the route you would like to remove.
Step 3.
Check the checkbox named
Delete this route
.
Click the
Apply
button below to apply the setting or click
Cancel
to discard changes.
Page 22 / 133
22
Logging
Click on
System
in the menu bar, and then click
Logging
below it.
Logging, the ability to audit decisions made by the firewall, is a vital part in all network
security products. The D-Link DFL-200 provides several options for logging its activity. The D-
Link DFL-200 logs its activities by sending the log data to one or two log receivers in the
network.
All logging is done to Syslog recipients. The log format used for syslog logging is suitable
for automated processing and searching.
Page 23 / 133
The D-Link DFL-200 specifies a number of events that can be logged. Some of those
events, for instance, startup and shutdown events, are mandatory, and will always generate
log entries. Others, for instance to log if when allowed connections are opened and closed, is
configurable. It’s also possible to have E-mail alerting for IDS/IDP events to up to three email
addresses.
Enable Logging
Follow these steps to enable logging.
Step 1.
Enable syslog by checking the
Syslog
box.
Step 2.
Fill in your first syslog server as
Syslog server 1,
if you have two syslog servers
you have to fill in the second one as
Syslog server 2
.
You must fill in at least one syslog
server for logging to work.
Step 3.
Specify what facility to use by selecting the appropriate syslog facility. Local0 is
the default facility.
Click the
Apply
button below to apply the setting or click Cancel to discard changes.
Enable Audit Logging
To start auditing all traffic trough the firewall, follow the sets below and the firewall will start
logging all traffic trough the firewall, this is needed for running third party log analyzers on the
logs and to see how much traffic different connections use.
Follow these steps to enable auditing.
Step 1.
Enable syslog by checking the
Enable audit logging
box.
Click the
Apply
button below to apply the setting or click Cancel to discard changes.
Enable E-mail alerting for ISD/IDP events
Follow these steps to enable E-mail alerting.
Step 1.
Enable E-mail alerting by checking the
Enable E-mail alerting for IDS/IDP
events
checkbox.
Step 2.
Choose the sensitivity level.
Step 3.
In the
SMPT Server
field, fill in the SMTP server to which the DFL-200 should
send email.
Step 4.
Specify up to three valid email addresses to receive the email alerts.
Click the
Apply
button below to apply the setting or click Cancel to discard changes.
Page 24 / 133
24
Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the
rules. For more information about how to enable intrusion detection and prevention on a
policy or port mapping, read more under
Policies
and
Port Mappings
in the Firewall section
below.
Page 25 / 133
Time
Click on
System
in the menu bar, and then click
Time
below it. This will give you the
option to either set the system time by syncing to an Internet Network Time Server (NTP) or
by entering the system time by hand.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top