Home

D-Link DFL-1500

image

Contents

1. z i Zee A j Forward the matched packet Dont log the matched packe 66 Virtual Private Network IPSec DFL 1500 User Manual Step 7 View the result ADVANCED SETTINGS gt Firewall gt Edit Rules Now we have inserted a new rule before the Status Show Rules Attack Alert Summary default firewall rule Any packets from 192 168 40 0 24 to 192 168 88 0 24 will l be allowed to pass through the DFL 1500 and successfully access the 192 168 88 0 24 Block v through the VPN tunnel Item Status SSS anti Action Mache Nama Dieclen SowcalP ddiem DesiP ditem Senica Aston Log AMES MAA AAA pas MA we gt es ie E de Joe Ji gt DES MD5 IPSec tunnel the Manual Key way In the previous section we have introduced IKE method Here we will introduce another method using Manual Key way instead of IKE to install DFL 1 At DFL 1 At the first we will use the Manual Key way to install the IPSec properties of DFL 1 Step 1 Enable IPSec ADVANCED SETTINGS gt VPN Settings gt IPSec Check the Enable IPSec checkbox and click Apply item Status Condition Action Active Name LocalLAN Remote LAN Mechanism MyIP Security Gateway Step2 Add a Manual Key rule ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key Click the Manual Key hyperlink and click Add to L2TP add a new IPSec VPN tunnel endpoint Item Status Condition Action Active Name LocalLAN R
2. Active Name Direction Source IP Address Dest IP Address Service Action Log 1 Y Default WAN to LAN1 Any Any Any Block Y Page 1 1 ADVANCED SETTINGS gt Firewall gt Edit Rules gt Insert Edit Rules Status Show Rules Attack Alert Summary Firewall gt Edit Rules gt Insert Insert a new WAN1 to WAN1 Firewall rule Activate this rule Rule name Allow yPNIKE rule Source IP 192 168 88 0 Dest IP 192 168 40 0 Netmask 255 255 255 0 Netmask 255 255 255 0 Service Any Configure dest port Type o Single Dest Port to FP 21 B Forward Y the matched packet Dont log the matched packet Range Copy To Dist 70 Virtual Private Network IPSec DFL 1500 User Manual Step 8 View the result ADVANCED SETTINGS gt Firewall gt Edit Rules Here we have a new rule before the default _ Status Show Rules Attack Alert Summa firewall rule This rule will allow packets from 192 168 88 0 255 255 255 0 pass through DFL 1500 And accomplish the VPN tunnel A 5 j establishment Block IM Item Status Condition Action N mame VE mama sam 2 Fa EEE A A ea Y bet Eu Die MeeBem Ji all At DFL 2 Second we will use the Manual Key way to install the IPSec properties of DFL 1 Step 1 Enable IPSec ADVANCED SETTINGS gt VPN Settings gt IPSec Check the Enable IPSec checkbox and click Apply MENT nn Item Status Condition Action Active Name LocalLAN Remote LAN
3. Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on BOOTP adding the capability of automatic allocation of reusable network addresses and additional configuration options DHCP captures the behavior of BOOTP relay agents and DHCP participants can interoperate with BOOTP participants DHCP consists of two components a protocol for delivering host specific configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts DMZ Demilitarized Zone From the military term for an area between two opponents where fighting is prevented DMZ Ethernets connect networks and computers controlled by different bodies They may be external or internal External DMZ Ethernets link regional networks with routers Firewall A device that protects and controls the connection of one network to another for traffic both entering and leaving Firewalls are used by companies that want to protect any network connected server from damage intentional or otherwise by those who log in to it This could be a dedicated computer equipped with security measures or it could be a software based protection IPSec IP Security IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet IPSec acts at the network layer protecting and authenticating IP packets between participating IPSec devices peers
4. L2TP Layer 2 Tunneling Protocol Layer Two Tunneling Protocol L2TP is an extension of the Point to Point Tunneling Protocol PPTP used by an Internet Service Provider ISP to enable the operation of a Virtual Private Network VPN over the Internet L2TP merges the best features of two other tunneling protocols PPTP from Microsoft and L2F from Cisco Systems The two main components that make up L2TP are the L2TP Access Concentrator LAC which is the device that physically terminates a call and the L2TP Network Server LNS which is the device that terminates and possibly authenticates the PPP stream NAT Network Address Translation By the network address translation skill we can transfer the internal network private address of DFL 1500 to the public address for the Internet usage By this method we can use a large amount of private addresses in the enterprise 131 D Link Part VII POP3 Post Office Protocol 3 POP3 Post Office Protocol 3 is the most recent version of a standard protocol for receiving e mail POP3 is a client server protocol in which e mail is received and held for you by your Internet server Periodically you or your client e mail receiver check your mail box on the server and download any mail PPTP Point to Point Tunneling Protocol PPTP extends the Point to Point Protocol PPP standard for traditional dial up networking PPTP is best suited for the remote access applications of V
5. A Table A gt Step 2 Fill out the related field Advanced Settings gt Routing gt Static Route gt Add Fill in the destination and the netmask field with Policy Route Routing 140 116 53 0 and 255 255 255 0 Assign the next hop Gateway aS 61 216 120 148 the WAN2 IP address Click Add to proceed Net u 140 116 53 0 255 255 255 0 61 216 120 148 FIELD DESCRIPTION EXAMPLE T Determine this static routing entry record is multiple hosts Net or a single Net ype host Host Destination The destination IP address of this static routing entry record 140 116 53 0 Netmask The destination IP Netmask of this static routing entry record 255 255 255 0 Gateway The default gateway of this static routing entry record 61 216 120 148 Table 7 1Add a static routing entry 46 Routing Step 3 View the result The static route has been stored After filling data completely view the static routing entries which have been set 7 4 2 Add a policy routing entry Step 1 Insert a policy routing entry Click Insert button to add a policy routing entry Step 2 Fill out the related field For the General Manager Room department we need to set an extra policy routing entry for them So in the Status region make sure the Activate the rule is enabled Rule name field fill in GenlManaRoom n the Condition region we fill 192 168 40 192 in Source IP field Fill 255 255 255 192 in the Netmask field In the Action r
6. Chapter 10 Virtual Private Network IPSec This chapter introduces IPSec VPN and explains how to implemeni it As described in the Figure 2 1 we will extend to explain how to make a VPN link between LAN 1 and LAN 2 in this chapter The following Figure 10 1 is the real structure in our implemented process 10 1 Demands 1 When a branch office subnet LAN wants to connect with another branch office subnet LAN 2 through the public Internet instead of the expensive private leased lines VPN can provide encryption and authentication to secure the tunnel that connects these two LANS Organization 1 Organization 2 Private LANs Private LANs LAN1 IP WAN2_IP LAN2 IP 192 168 40 254 210 2 1 1 192 168 88 254 i internet PC1 1 192 168 40 1 DHCP Client N LAN 1 92 168 40 1 25 192 168 88 1 192 168 88 2 LAN 2 92 168 88 1 25 Figure 10 1 Organization_1 LAN_1 is making VPN tunnel with Organization_2 LAN_2 10 2 Objectives 1 Let the users in LAN_1 and LAN_2 share the resources through a secure channel established using the public Internet 10 3 Methods 1 Separately configure DFL 1 and DFL 2 which are the edge gateways of LAN_1 and LAN_2 respectively You have to determine a key management method between IKE Internet Key Exchange and Manual Key The following table compares the settings between IKE and Manual Key In the following we will describe them separately Local Address means
7. gt the default rule item Status Condition Action Active Name Direction Source IP Address Dest IP Address Service Action G1 Y Defautt ANY toLANT Ay A Any defelass FIELD DESCRIPTTON EXAMPLE Select the rule direction of rule which you are going to configure Edit ANY to LANI rules the previous page If there are more than one action rules you can press Next Page to go to the next page Table 17 4 Setup edit rules page of Bandwidth Management 109 D Link Step 6 Customize the Rules Enter a rule name such as inFTP enter the Source IP as 140 113 179 3 and the netmask as 255 255 255 255 Enter the Dest IP as 192 168 40 1 and the netmask as 255 255 255 255 Select the action to be inFTP In this way all FTP Server to PC1_1 packets will be put into the inFTP queue and scheduled out at 1019kbps bandwidth Click Apply to store the changes Repeat the same Part VI ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Rules gt Insert Status Edit Actions Status Condition Show Rules Summa 140 113 179 3 192 168 40 1 255 255 255 255 255 255 255 255 procedure for the inVideo class Activate this rule Source IP amp Netmask Dest IP amp Netmask Status Well known port Action o J nFTIP vw Bak Ay Ret FIELD DESCRIPTION EXAMPLE Enable this bandwidth management rule The bandwidth management rule name When source IP address of incoming packets conforms th
8. TANITIP LV 192 168 40 254 gt 192 168 40 1 253 t Figure 7 1 Add policy routing entry for the General Manager Room department 7 2 Objectives 1 The network administrator plans to solve the problem by subscribing the second link ISP2 He She wires the ISP2 to the WAN2 socket of the DFL 1 Now there are two WAN links connected to the DFL 1 He she hopes that all the packets destined to the subnet 140 116 53 0 255 255 255 0 will pass through the WAN2 link instead of the default WANI link In such a way the WAN2 link can offload the traffic 2 The same as the above However routing table can only be specified by destinations That is routing table can only direct some packets destined to somewhere through some link It cannot direct some packets from somewhere through some 45 D Link Part II link The policy route can solve this problem He she hopes that all the packets from the General Manager Room will pass through the WAN2 link instead of the default WANI link 7 3 Methods 1 Add a static routing entry to direct the packets towards 140 116 53 0 255 255 255 0 through the WAN link 2 Add a policy routing entry for the packets coming from General Manager Room department 192 168 40 192 255 255 255 192 through the WAN2 link 7 4 Steps 7 4 1 Add a static routing entry Step 1 Add a static routing entry Advanced Settings gt Routing gt Static Route Click the Add button to the next process Routing
9. indicated to finish these settings Condition 1234567890 Encrypt and Authenticate DES MD5 v 8500 o a DH1 Encrypt and Authenticate DES MD5 v 6800 gt 3 O Apply Reset FIELD DESCRIPTION EXAMPLE Utilize this field to select some packets which are Local to Remote Protocol destined for a specified port Dest Port or coming from Src Port Dest Port specified port Src Port can use IPSec feature The direction is from local to remote Condition TCP 0 80 62 Virtual Private Network IPSec DFL 1500 User Manual Remote to Local Protocol Utilize this field to select some packets which are Src Port Dest Port destined for specified port Dest Port or coming from specified port Src Port can use IPSec feature The direction 1s from remote to local Enable Replay Detection Whether s the Replay Detection enabled Phasel Negotiation Mode pai Main or Aggressive mode see Chapter 9 for Pre Shared Key a only it is set previously and can not be edited ANY 0 0 Encrypt and Encryption Algorithm Choose an encryption and authentication algorithm Authenticate DES MDS Set the IKE SA lifetime A value of 0 means IKE SA SA Life Time negotiation never times out See Chapter 9 for details Ne Key Group Choose a Diffie Hellman public key cryptography key DHI ction group Phase2 View only it is set previously and can not be edited again View only it is set previo
10. 31 40 2668713 FAX 31 40 2668666 URL www d link benelux nl amp www dlink benelux be E MAIL info dlink benelux nl info dlink benelux be D Link Norway Waldemar Thranesgate 77 0175 Oslo Norway TEL 47 22 99 18 90 FAX 47 22 20 70 39 SUPPORT 800 10 610 URL www dlink no D Link Russia Michurinski Prospekt 49 117607 Moscow Russia TEL 7 095 737 3389 amp 7 095 737 3492 FAX 7 095 737 3390 URL www dlink ru E MAIL vl dlink ru D Link International 1 International Business Park 03 12 The Synergy South Africa Spain Sweden Singapore 609917 TEL 6 6774 6233 FAX 6 6774 6322 E MAIL info dlink com sg URL www dlink intl com D Link South Africa Unit 2 Parkside 86 Oak Avenue Highveld Technopark Centurion Gauteng South Africa TEL 27 12 665 2165 FAX 27 12 665 2186 URL www d link co za E MAIL attie d link co za D Link Iberia Spain and Portugal Sabino de Arana 56 bajos 08028 Barcelona Spain TEL 34 93 409 0770 FAX 34 93 491 0795 URL www dlink es E MAIL info dlink es D Link Sweden P O Box 15036 S 167 15 Bromma Sweden TEL 46 8 564 61900 FAX 46 8 564 61901 URL www dlink se E MAIL info dlink se 140 Part VI Customer Support DFL 1500 User Manual Taiwan D Link Taiwan 2F No 119 Pao chung Road Hsin tien Taipei Taiwan TEL 886 2 2910 2626 FAX 886 2 2910 1515 URL www dlinktw com tw E MAIL dssqa tsc dlinktw com tw Turkey D Link Middle East Deniz Bilgisayar Buyukdere Cad
11. Apply button See the steps in the right diagram Subsequently we will continue to setup another class such as inVideo class Select the default class and click the Create Sub Class to create Action another sub class named inVideo from the th 66 95 left default class Enter 29 in the bandwidth field 7 dl As FIELD DESCRIPTION EXAMPLE Activate this class Enable the bandwidth management class for later using enabled Bandwidth How many percentage does this class occupy higher class When the bandwidth of other class 1s idle it will use the bandwidth of Borrow Enabled other class to increase bandwidth temporarily Back back to previous configuration page N A Apply Apply the settings which have been configured N A Reset Clean the filled data and restore the original one N A Table 17 3 Add new class in the bandwidth management feature Class name Bandwidth management class name 108 Bandwidth Management DFL 1500 User Manual Step 4 Partition into Classes ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Actions gt Create Now there are two actions under the default SUb Class action Status Edit Rules Show Rules Summary Gree EM Step 5 Setup ANY to LAN1 Rules ADVANCED SETTINGS gt Bandwidth Mot gt Edit Rules Select ANY to LAN1 to display the rules There is Status Edit Actions a pre defined rule that matches all traffic into the default class Click Insert to insert a rule before
12. DFL 1500 sys reboot now Rebooting syncing disks done rebooting 20 4 2 Steps for EMERGENT factory reset Step 1 0 Enter the boot loader gt gt NetOS Loader i386 V1 1 Tue Dec 30 08 39 49 CST 2003 If you forget the password this is the only way to Press lt TAB gt to prompt recover your system Press lt tab gt or lt space gt Type boot rescue to load safe mode kernel to during the 2 second countdown process 1 rescue corrupted firmware 2 reset password for admin starting in 0 type or help for help gt 121 D Link Part VII Step 2 Enter the Safe Mode gt boot rescue Enter boot rescue to enter the emergency 6 1298 7888404 127552 0x84524c kernel In this kernel you can use tftp to fetch NetOS Ver1 40B WALL EMERGENCY 3 Thu Aug 28 06 02 07 CST 2003 another firmware to install or reset the cpu0 Intel null Celeron 686 class 1202 85 MHz configuration to default even you lost the total memory 255 MB password avail memory 228 MB Ethernet address 00 80 c8 50 fa 10 100 Mb s Ethernet address 00 80 c8 50 fa 10 100 Mb s Ethernet address 00 80 c8 50 fa 10 100 Mb s Ethernet address 00 80 c8 50 fa 10 100 Mb s Ethernet address 00 80 c8 50 fa 10 100 Mb s wd0 drive supports PIO mode 4 DFL 1500 gt Step 3 Factory reset DFL 1500 gt en Enter sys resetconf now to reset the firmware DFL 1500 sys resetconf now to factory default Then enter sys reboot n
13. Fixed IP WANI Port 1 Not initialized PPPoE DHCP IP Address Subnet Mask Gateway IP Primary DNS Secondary DNS PPPoE Username PPPoE Password Fixed IP WAN2 Not initialized Port 2 PPPoE DHCP IP Address 10 1 1 254 DMZ1 Port 3 IP Subnet Mask 255 255 255 0 IP Address 192 168 1 254 LAN1 Port 4 IP Subnet Mask 255 255 255 0 IP Address 192 168 2 254 LAN2 Port 5 IP Subnet Mask 255 255 255 0 Table 1 1 DFL 1500 related network settings 1 4 Wiring the DFL 1500 A First connect the power cord to the socket at the back panel of the DFL 1500 as in Figure 1 2 and then plug the other end of the power adapter to a wall outlet or power strip The Power LED will turn ON to indicate proper operation Quick Start DFL 1500 User Manual Figure 1 2 Back panel of the DFL 1500 B Using an Ethernet cable insert one end of the cable to the WAN port on the front panel of the DFL 1500 and the other end of the cable to a DSL or Cable modem as in Figure 1 3 C Computers with an Ethernet adapter can be directly connected to any of the LAN ports using a cross over Ethernet cable as in Figure 1 3 D Computers that act as servers to provide Internet services should be connected to the DMZ port using an Ethernet Cable as in Figure 1 3 Figure 1 3 Front end of the DFL 1500 D Link Part I 1 5 Default Architecture of DFL 1500 Organization_1 LAN_2 192 168 2 1 253 WAN1_IP ISPl modem Intern
14. The DFL 1500 can be manually configured with Many to One and Many to Many One to One and bidirectional One to One rules to do policy based NAT Table 6 1 Determine Network Address Translation Mode Step 2 Check NAT Rules ADVANCED SETTINGS gt NAT gt NAT Rules As described in the above the DFL 1500 has set HAT Visual the three rules for the LAN1 LAN2 and DMZ1 zones They all belong to the Many to One M 1 type that will map many private addresses to the automatically chosen public IP address EE Status Condition Action When the WAN interfaces change the IP these Active Name Direction Source IP Address Translate Src IP into Type rules do not require any manual modifications for the changed public IP addresses The rules will automatically reload the new settings In the Basic mode you cannot edit the rules in this page Step 3 Switch the NAT Mode Select the Full Feature from the list of NAT Server Sessions Sessions Network Address Translation Mode Click Apply After applying the setting the page will highlight a warning saying that the rules are no more automatically maintained by the DFL 1500 If you change the LAN DMZ IP settings you have to manually update related rules by yourself Otherwise hosts in your LAN DMZ cannot establish connections to the hosts in the WAN side to di N Note In Full Feature mode NAT if you modify LAN DMZ address settings you must manually reconfigure the
15. see Chapter 9 for Select the Encryption DES or 3DES and Authentication ESP Encryption MD5 or SHA1 Algorithm combination And enter the DES key either hex or string format separately Authentication MDS Incoming SPI ESP Encryption Authentication or AH Authentication Table 10 4 Add a IPSec Manual Key rule Step 4 Detail settings of IPSec Manual ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key gt Add Key gt Advanced For the detailed setting in the Manual Key We can press the Advanced button in the previous page Then set the parameter separately Condition Action Back A Res FIELD DESCRIPTION EXAMPLE Use this field to select some packets which are destined Local to Remote Protocol for specified port Dest Port or coming from specified TCP 0 80 Src Port Dest Port port Src Port can use IPSec feature The direction 1s from local to remote Remote to Local Protocol Use this field to select some packets which are destined Src Port Dest Port for specified port Dest Port or coming from specified port Src Port can use IPSec feature The direction 1s from remote to local Enable Replay Detection Whether is the Replay Detection enabled Table 10 5 Setup Advanced feature in the IPSec Manual Key rule Condition ANY 0 0 69 D Link Step 5 Remind to add a Firewall rule After finishing IPSec rule settings we need to add a firewall r
16. 1 254 255 255 255 0 the request will be translated into a public source IP requests and then be forwarded to the destinations 1 7 2 WAN1 to DMZ1 Connectivity Part I BASIC SETUP gt LAN Settings gt LAN1 Status LAN1 Status LAN Status IP Alias LAN1 TCP IP IP Address 192 169 1 254 IP Subnet Mask 255 255 255 0 DHCP Setup v Enable DHCP Server IP Pool Starting Address 192 168 1 100 Pool Size 20 Primary DNS Server 192 168 1 254 Secondary DNS Server 0 0 0 0 7200 Routing Protocol None OSPF Area ID Note The IP Pool Starting Address must be on the same subnet specified inthe IP Address and the IP Subnet Mask field For example the addresses given by the 192 168 1 100 with a pool size of 20 192 168 1 100 192 168 1 120 are all within the same range of 192 168 1 254 2554255525540 ADVANCED SETTINGS gt NAT gt Status Status NAT Rules NAT Virtual Server Sessions Servers Sessions Network Address Translation Mode Basic v Network Address Translation NAT translates the IP port for 1 LAN DMZ to VVAN traffic map private src IPs and ports to the DFL 1500 s WAN public IPs and ports 2 LANAWAN to DMZ traffic map public dest IPs and ports to the DMZ servers private IPs and ports Modes 1 None The DFL 1500 is in routing mode without performing any address translation 2 Basic The DFL 1500 automatically performs Many to One NAT for all LAN DMZ subnets 3 Full Feature The DFL 1500 can be manually c
17. 1 254 DNS IP Address Primary DNS 1168 95 1 1 secondary DNS 0 0 0 0 Routing Protocol None OSPF Area ID BASIC SETUP gt Wizard gt Next gt PPPoE System Status System WAN1 IP Name IP Address Assignment PPP over Ethernet Default WAN link Gateway DNS Service Name Optional User Name 1234567 5 hinet net Password 00000000 Get DNS Automatically DHCP O DNS IP Address Primary DNS 0 0 0 0 Secondary DNS 0 0 0 0 Disconnected Quick Start DFL 1500 User Manual Step 5 System Status BASIC SETUP gt Wizard gt Next gt Next Here we select PPPoE method in WAN1 port Then System Want IP the DFL 1500 provides a short summary of the system Please check if anything mentioned above is properly set into the system Click Finish to close the wizard i PPPol E Not initialized OA rn 1 7 Internet Connectivity After setting up DFL 1500 with the wizard DFL 1500 can connect to the ISP In this chapter we introduce LAN1 to WAN1 Connectivity to explain how the computers under LANI can access the Internet at WANI through DFL 1500 Subsequently we introduce WANI to DMZ1 Connectivity to explain how the servers under DMZ1 can be accessed by the LAN users and other Internet users on the WAN side You MUST press Apply to proceed to the next page Once applying any changes the settings are immediately updated into the flash memory 1 7 1 LAN1 to WAN1 Connectivity The
18. 1 32 els sl plo Apply Reset FIELD DESCRIPTION EXAMPLE Enable IDS Enable IDS feature of DFL 1500 Detect Attacks Towards Specified the IP address region of each DMZ LAN Server area Options This option is designed to memory efficient This has configurable memory usage and fragment timeout options It uses the default memory limit of 4194304 bytes 4 MB nn and a timeout period of 60 seconds The timeout period is used to determine a length of abe time that an unassembled fragment should be discarded This option provides TCP stream reassembly and stateful analysis capabilities Robust stream reassembly capabilities ignore stateless attacks such as stick It also gives Stateful Inspection large scale users the ability to track more than 256 simultaneous TCP streams It should enabled be able to scale to handle 32 768 simultaneous TCP connections in 1ts default configuration reassemble This option 1s used to process HTTP URI strings and convert their data to non obfuscated ASCII strings For example HTTP defines a hex encoding method for Normalize HTTP Requests characters such that the string 20 is interpreted as a single space ex Webservers are enabled TCP Stream Reassembly This item is collocating Stateful Inspection to increase prevention ability of packet designed to handle the myriad of clients available as well as being written to support many different standards Microsoft webservers handle additional types
19. 17 4 2 Outbound Traffic Management Step 1 Enable Bandwidth Management Check the Enable Bandwidth Management checkbox click the Apply Step 2 Setup the WANT Link Select ANY to WAN1 to setup traffic that will transmit by the WAN1 interface Enter the WAN1 interface bandwidth as 1544kbps Click the Apply button to enforce the WANT link bandwidth to be 1544kbps Then click Create Sub Class to partition the default class ADVANCED SETTINGS gt Bandwidth Mgt gt Status ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Actions Edit Rules Show Rules Su Defined Actions A WANI Interface Gee Sis 111 D Link Step 3 Partition into Classes Create a sub class named LANa to LANb from the default class Enter 65 in the bandwidth field check the Borrow button and click Apply Select the default class and click the Create Sub Class to create another sub class named outFTP from the default class Enter 30 in the bandwidth field and click Apply Now there are two actions under the default action They are separately LANa to LANb and outFTP class Step 4 Setup ANY to WAN1 Rules Select ANY to WAN1 to display the rules There is a pre defined rule that matches all traffic into the default class Click Insert to insert a rule before the default rule Step 5 Customize the Rules Enter a rule name such as outVPN enter the Source IP as 192 168 40 0 and the netmask as 255 255 255 0 Enter the Dest IP
20. 35 DFL 1500 User Manual Appendix E Index POP3 93 95 restore configuration 122 Routing 45 policy routing 45 static routing 45 SMTP 93 94 syslog 117 118 tftp upgrade 119 Virtual Server 12 36 40 42 VPN 55 AH 57 DH 56 Encapsulation 56 ESP 57 IKE 59 IPSec 55 59 Key Management 55 L2TP 79 Manual Key 59 PFS 56 PPTP 75 SA Security Association 55 VPN 55 Appendix F Hardware Detailed Description Hardware Chassis Dimensions Rack mount 1U size 146 mm H x 275 mm D x 203 mm W 8 5 75 10 Look amp feel D Link style Key Components CPU Intel Celeron 1 2G 256MB 168 P SDRAM 10 100M Ethernet MAC and PHY Intel 182559 PCI bridge Intel FW82801BA Storage Compact Flash 32MB San Disk FW82815EP Super I O hardware monitor IT8712F A Security processor Safenet 1141 VPN accelerator board Memory Memory control HUB Hardware monitor Port functions WAN port EN a a a a a a en ar o N N N N N mp CO N 501 EE M N 2 port for connecting to outbound WAN RJ 45 connector IEEE 802 3 compliance IEEE 802 3u compliance Support Half Full Duplex operations Support backpressure at Half Duplex operation Support Auto MDI MDI X IEEE 802 3x Flow Control support for Full Duplex mode 2 port for connecting inbound LAN RJ 45 connector IEEE 802 3 compliance IEEE 802 3u compliance Support Half Full Duplex operations Suppor
21. 5 with port 21 and then be forwarded to the 10 1 1 5 The FTP server listening at port 21 in 10 1 1 5 will pick up the request Step 10 View the WAN to LAN Sessions Click the Server Sessions to see the sessions between WAN to LAN DFL 1500 User Manual ADVANCED SETTINGS gt NAT gt Virtual Servers Sessions Sessions ir Status Condition Action Name Direction Dest IPAddress Service Translate dest IP port into CT ao ae a hel ae ee MER NEE Next Page ADVANCED SETTINGS gt NAT gt Server Sessions Sessions Servers Item Local Server DFL 1500 Remote Client 43 Routing DFL 1500 User Manual Chapter 7 Routing This chapter introduces how to add static routing and policy routing entries To facilitate the explanation on how DFL 1500 implements routing and how to use it we zoom in the left part of Figure 2 1 into Figure 7 1 7 1 Demands 1 The bandwidth subscribed from ISP1 is insufficient so that some important traffic say traffic towards the subnet 140 116 53 0 255 255 255 0 is blocked by the other traffic 2 The bandwidth subscribed from ISP1 is insufficient so that some important traffic say the traffic from PCs belonging to the General Manager Room department 192 168 40 192 255 255 255 192 is blocked by the other traffic Organization_1 Private LANs WebSe ert FipServeri DHCPServert 10 1 1 10 1 1 5 10 1 1 10 r Default CEMZI_P WAN1_IP 10 1 1 254 61 2 1 1 ag Internet
22. AllowVPNIKErule Source IP as 192 168 40 0 and Dest IP as 192 168 88 0 Click Apply to store this rule Part Ill ADVANCED SETTINGS gt VPN Settings gt IPSec gt IKE gt Add IPSec PPTP L2TP 1 If you enable the firewall please check whether these firewall rules would block packets in tunnel 2 Packets are blocked by default in the WAN to LAN direction please add a rule to forward these tunneled packets 3 The source address imask and the destination address mask of the firewall rules are 192 168 88 0 255 255 255 0 and 192 168 40 0 255 255 255 0 respectively ok ADVANCED SETTINGS gt Firewall gt Edit Rules Edit Rules Show Rules Attack Alert Status Summary Edit WANT Y to LAN Y rules Toa Mon Block Packets are top down matched by the rules Active Name Direction Source IP Address 1 Y Default WANT to LANT Any Any Any v viLog Apply Action Action Log Block Y Dest IP Address Service Page 1 1 ADVANCED SETTINGS gt Firewall gt Edit Rules gt Insert Edit Rules Show Rules Attack Alert Status Summary Firewall gt Edit Rules gt Insert Insert a new WAN1 to WAN1 Firewall rule Status _ i l Activate this rule Rule name Allow PNIKErule NOT Roel m Tg Condition Netmask 255 255 255 0 Netmask 255 255 255 0 Source IP 192 168 40 0 Dest IP 192 168 88 0 Service Any Y Configure dest port Single Type Range Dest Port to FTP 21 v Cory ToDist
23. Ans It is because there is someone logining into the DFL 1500 at the same time with the other IP address Please logout the system from that IP address first and then login with your IP address again You are definitely able to login into the DFL 1500 If the disconnection happens because of the modification of the WAN LAN DMZ IP address for example you login into the system from LANI and then modify the LANI IP address you can solve this problem by one of the following three ways a Wait for the DFL 1500 session timeout and then you can login into DFL 1500 again The default timeout is 5 minutes in the System Tools Admin Settings Timeout After session timeout happens we could login DFL 1500 another time 126 Trouble Shooting DFL 1500 User Manual b You can use supplied console to login into the DFL 1500 system and then logout the system That will clean up the zombie left in the system so you will be able to login to the DFL 1500 from the same side C The final way 1s to power off the DFL 1500 and then turn on the power After DFL 1500 reboot you can login into DFL 1500 again Firewall VPN Router DFL 1500 Firewall PN Router Please LOGIN first Configuration is locked by administrator from 192 168 40 153 Aeb configurator may be locked by another administrator from 192 168 40 153 gt Figure B 3 Login process 1s locked by the web configurator 8 Why does it always show the message as Figure B 4 indic
24. BASIC SETUP gt WAN Settings gt IP Alias gt Add Suppose you apply 8 IP addresses from ISP The _YWANLIE WANZ IE range of the ISP given IP address is from 211 17 25 56 to 211 17 25 63 Now you would like to add a WAN1 IP alias Select WAN1 in the Interface Enter the IP alias and Netmask with 211 17 25 62 255 255 255 248 And then click Apply Bak m Ren Noticd It s the same way to set IP alias in DMZ or LAN Table 3 4 Add a IP alias record Step 2 Edit Delete IP alias record BASIC SETUP gt WAN Settings gt IP Alias You can easily add edit or delete IP alias records by the Add Edit or Delete button Step 3 Add a static or policy routing In the Advanced Settings gt Routing pages setup the static or entry policy routing pages to share the outbound traffic load Refer to the Chapter 7 explanation 19 System Tools DFL 1500 User Manual 4 1 a Le 4 3 Chapter 4 System Tools This chapter introduces System Management and explains how to implement it Demand Basic configurations for domain name password system time timeout and services DDNS Suppose the DFL 1500 s WAN uses dynamic IP but needs a fixed host name When the IP is changed it is necessary to have the DNS record updated accordingly To use this service one has to register the account password and the wanted host name with the service provider DNS Proxy Shorten the time of DNS lookup performed b
25. By vetined Actions default the link is partitioned into two classes control class ct1_class and default class def_class The control class reserves bandwidth for control protocols such as ICMP TCP ACKs The default class is the default action of non matched packets The default class can be recursively partitioned into more classes The classes are organized as a tree Click Create Create Sub class Sub Class to partition the default class FIELD DESCRIPTION EXAMPLE Select the direction of action which you are going to configure one ze an WANI Interface Fill the real bandwidth which is located in the upper direction 1544 Bandwidth __ kbps If there are more than one action pages you can press Prev Page to back to the previous page Create Sub class Create a sub class from the indicated class 107 D Link Part VI Delete Delete the indicated class If there are more than one action pages you can press Next Page to g0 to Next Page pages y P 8 8 the next page Table 17 2 Setup edit actions page of Bandwidth Management Step 3 Add new classes ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Actions gt Create Create a sub class named inFTP from the Sub class default class Enter 66 in the bandwidth field _ Status Edit Actions Edit Rules Show Rules Summa Make sure that Borrow button is checked and then inFTP class will enlarge the bandwidth from borrowing other unused bandwidth Finally click
26. LAN Settings page allows you to modify the IP address and Subnet Mask that will identify the DFL 1500 on your LAN This is the IP address you will enter in the URL field of your web browser to connect to the DFL 1500 It is also the IP address that all of the computers and devices on your LAN will use as their Default Gateway D Link Step 1 Device IP Address Setup the IP Address and IP Subnet Mask for the DFL 1500 Step 2 Client IP Range Enable the DHCP server if you want to use DFL 1500 to assign IP addresses to the computers under LAN1 Specify the Pool Starting Address Pool Size Primary DNS and Secondary DNS that will be assigned to them Example in the figure the DFL 1500 will assign one IP address from 192 168 1 100 192 168 1 120 together with the DNS server 192 168 1 254 to the LAN1 PC that requests for an IP address Step 3 Apply the Changes Click Apply to save Now you can enable the DHCP clients on your LAN1 PCs to get an IP Step 4 Check NAT Status The default setting of NAT is in Basic Mode After completing Step 3 the NAT is automatically configured with three rules to let all private IP LAN DMZ to WAN requests to be translated with the public IP assigned by the ISP Step 5 Check NAT Rules The DFL 1500 has added three NAT rules The rule Basic LAN1 number 3 means that when matching the condition requests of LAN DMZ to WAN direction with its source IP falling in the range of 192 168
27. MAC mapping table ifconfig ip ifconfig INTF1 192 168 1 100 Configure the ip address of each port 2532532590 ip ping 202 11 22 33 Send ICMP messages tftp ip tftp upgrade all 1 2 3 4 preserve Upgrade Backup from to tftp server refer to Section 20 2 for detailed description Trace route to destination address or hostname Configure system parameters Change administrator password Reset system configuration to default settings Show system and network status Show DFL 1500 firmware version Table A 2 Privileged mode CLI commands 124 Trouble Shooting DFL 1500 User Manual Appendix B Trouble Shooting l If the power LED of DFL 1500 is off when I turn on the power Ans Check the connection between the power adapter and DFL 1500 power cord If this problem still exists contact with your sales vendor 2 How can I configure the DFL 1500 if I loss the account password of the DFL 1500 Ans Use the Console mode CLI to restore the factory setting refer to the procedure as prior section 20 4 2 3 I can t access DFL 1500 via the console port Ans Check the console line and make sure it is connected between your computer serial port and DFL 1500 Diagnostic RS 232 port Notice whether the terminal software parameter setting as follows No parity 8 data bits 1 stop bit baud rate 9600 bps The terminal type is VT100 4 IT can t ping DFL 1500 DMZ interface successfully Why Ans Follow below items to chec
28. Mechanism MyIP Security Gateway Step 2 Add a Manual Key rule ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key Click the Manual Key hyperlink and click Add to L2TP add a new IPSec VPN tunnel endpoint y Item Status Condition Action Active Name o LocalLAN Remote LAN Mechanism MyIP Security Gateway 71 D Link Step 3 Customize the rule Similar to those in DFL 1 except that you should interchange the Local IP Address with the Remote IP Address the My IP Address with the Security Gateway Addr and the Outgoing SPI with the Incoming SPI Step 4 Remind to add a Firewall rule After finishing IPSec rule settings we need to add a firewall rule Here system shows a window message to remind you of adding a firewall rule Just press the OK button to add a firewall rule Part Ill ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key gt Add IPSec PPTP L2TP IPSec gt Manual Key gt Edit Rule Status A v Active Manual Key Rule Name ManualKeyrule Condition j Local Address Type Subnet Address IP Address 192 168 568 0 PrefixLen Subnet Mask 255 255 255 0 Remote Address Type Subnet Address IP Address 192 168 40 0 PrefixLen Subnet Mask 255 255 255 0 My IP Address 210 2 1 1 Security Gateway Addr 61 2 1 1 Outgoing SPI hex 1111 Incoming SPI hex v 2222 Encapsulation Mode Transport Tunnel ESP Encryption DES V des Sdes 64 192 bits
29. address of local site DFL 1500 Firewall VPN Router The IP address of remote site device like DFL 1500 Firewall VPN Router DFL 1500 User Manual ADVANCED SETTINGS gt VPN Settings gt IPSec gt IKE gt Add Status KErule Condition Subnet Address Y 92 168 40 0 55 255 255 0 Subnet Address Y 92 168 88 0 55 255 255 0 Action Main v Tunnel Y 1 21 10 2 1 1 Encrypt and Authenticate DES MD5 vw 1234567890 Advanced Apply Reset EXAMPLE IKFrule Subnet Address 192 168 40 0 255 255 255 0 DESCRIPTION Subnet Address 192 168 88 0 A IIN 61 D Link Part III ESP Algorithm may be grouped by the items of the Encryption and Authentication Algorithms or execute separately We can select below items the Encryption and Authentication Algorithm combination or the below item Encrypt and ESP Algorithm Authentication Algorithm singly Authenfieate DESU MDS Here Encryption Algorithms include DES 3DES and AES Authentication Algorithms include MD5 and SHA1 AH Algorithm Select Authentication Algorithm MD5 or SHA1 disabled Pre Shared Key The key which is pre shared with remote side 1234567890 Table 10 2 Related field explanation of adding a IPSec policy rule Step 4 Detail settings of IPSec IKE ADVANCED SETTINGS gt VPN Settings gt IPSec gt IKE gt Add gt In this page we will set the detailed value of IKE Advanced parameter Fill in the related field as Table 10 3
30. as 192 168 88 0 and the netmask as 255 255 255 0 Select the action to be LANa toLANb In this way all outbound packets to the LAN 2 area will be put into the LANa toLANb queue and scheduled out at 1003kbps bandwidth Click Apply to store the changes Repeat the same procedure for the outWebDownload class Part VI ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Actions gt Create Sub Class Status Edit Actions Edit Rules Show Rules Summary Bandwidth Management gt Edit Actions Edit ANY Y to WANT classes WANT Interface Bandwidth 1544 kbps Apply Item Defined Actions Active Name Borrow Bandwidth EI ON 1544 kbps 1544 kbps 77 kbps 1466 kbps 1003 kbps 463 kbps WANT Interface Y 00 root_class Br 5 ctl_class e 95 def class Y 65 LANa to LANb Y 30 outFTP Page 1 1 Create Sub class ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Rules Status Edit Actions Edit Rules Show Rules Summary Bandwidth Management gt Edit Rules Edit ANY Y to WANI Y rules Packets are top down matched by the rules tem Status TT Action Active Name Direction Source IP Address Dest IP Address Service Action 1 Y Default ANY to WANI Any Any Any def_class Page 1 1 ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Rules gt Insert Status Edit Actions Edit Rules Show Rules Summary Bandwidth Management gt Edit Rules gt Insert Insert a new ANY to WAN1 Bandwidth Management rule Activate this rule Rule n
31. change the filename extension from vbs to vbs bin A Mapped Name 94 Content Filtering Mail Filters DFL 1500 User Manual Step 3 Customize the local zones ADVANCED SETTINGS gt Content Filters gt Mail Filters gt SMTP You can configure to what range the filters will EXempt Zone apply to the local zones By default the web filters Web Filter apply to all computers so the Enforce web filter policies for all computers is selected and the range is 0 0 0 0 255 255 255 255 Delete the default range by clicking the range item and the Delete button Enter the IP range in the Range fields followed by a click of the Add button to add one address range to the web filter Click Include and Apply if you want web filters to only apply to the specified ranges Click Exclude and Apply a N Mumin if you want web filters to apply to all computers except those specified ranges 14 5 Steps for POP3 Filters Step 1 Enable POP3 Filters ADVANCED SETTINGS gt Content Filters gt Mail Filters gt POP3 Check the Enable POP3 Proxy checkbox and Web Filter click Apply flename extension Y lis l OriginalName_ Mapped Name a Je FIELD DESCRIPTION EXAMPLE Enable POP3 Proxy Enable POP3 Proxy feature of DFL 1500 gt Filename extension When the filename extension of attachment file matches Filename Append bin to E mail extension add the bin extension to the atta
32. make TELNET SSH WWW HITPS SNMP others checked Then click the Apply button 32 D Link NAT Routing amp Firewall NAT DFL 1500 User Manual Chapter 6 NAT This chapter introduces NAT and explains how to implement it in DFL 1500 To facilitate the explanation on how DFL 1500 implements NAT and how to use it we zoom in the left part of Figure 1 4 into Figure 6 1 6 1 Demands 1 The number of public IP address allocated to each Internet subscribers is often very limited compared to the number of PCs in the LANI Additionally public IP hosts are directly exposed to the Internet and have more chances to be cracked by intruders 2 Internet servers provided by your company may open many ports in default that may be dangerous if exposed to the public Internet Organization_1 Private LANs DMZ_1 10 1 1 1 253 WebSeNer1 10 1 1 10 1 1 5 10 1 1 10 DMZ1 IP rig 1 254 WAN1_IP 61 2 1 switch A G lt DFL 1 Cl 1 192 168 40 1 DHCP Client LAN 1 92 168 40 1 25 Figure 6 1 Topology for explanations of the NAT examples 6 2 Objectives 1 LetPC1_1 PC1_5 connect to the Internet 2 Let FTPServerl be accessed by other Internet users 35 D Link Part II 6 3 Methods 1 Assign private IP addresses to the PC1_1 PC1_5 Setup NAT at DFL 1500 to map those assigned private hosts under LANI to the public IP address WAN_IP atthe WANI side 2 Assign a private IP address to the FTPServe
33. messages in three round trips SA negotiation Diffie Hellman exchange and an exchange of nonces a nonce is a random number This mode features identity protection your identity is not revealed in the negotiation m Aggressive Mode is quicker than Main Mode because it eliminates several steps when the communicating parties are negotiating authentication phase 1 However the trade off is that fast speed limits its negotiating power and it also does not provide identity protection It is useful in remote access situation where the address of the initiator is not known by the responder and both parties want to use pre shared key authentication gt Pre Shared Key A pre shared key identifies a communicating party during a phase IKE negotiation It is called pre shared because you have to share it with another party before you can communicate with them over a secure connection gt Diffie Hellman DH Key Groups Diffie Hellman DH is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communications channel Diffie Hellman is used within IKE SA setup to establish session keys 768 bit Group 1 DH1 and 1024 bit Group 2 DH2 Diffie Hellman groups are supported Upon completion of the Diffie Hellman exchange the two peers have a shared secret but the IKE SA is not authenticated For authentication use pre shared keys gt Perfect Forward Secrecy PFS Enabling PFS mean
34. must enable the remote management first Enable the specified port so that you can login from the configured port Step 1 Enable remote management SYSTEM Tools gt Remote Mgt gt TELNET TELNET SSH www HTTPS SNMP MISC Check the selected port located in the telnet function And customize the server port bss which is listened by telnet service d r gi Es hey Rest Step 2 Enable remote management SYSTEM Tools gt Remote Mgt gt TELNET SSH TELNET HTTPS SNMP MISC Check the selected port located in the ssh function And customize the server port which is listened by ssh service Apply A 2 CLI commands list Subsequently we can use the console ssh telnet to connect the DFL 1500 After logining the system successfully we can use the CLI commands to configure DFL 1500 The complete CLI commands are described as follows Non privileged mode Kani D Example Command description commands commands Fone Prien 123 D Link Part VII Table A 1 Non privileged mode CLI commands Note If you don t know what parameter is followed by the commands just type following the command Ex ip It will show all the valid suffix parameters from ip Privileged mode Main Sub oot Example Command description commands commands disable dis PY disable Turn off privileged mode command exit ex A 7 OO Exit command shell Configure IP related settings arp Show the ip
35. rule Source IP amp Netmask PCI 1 192 168 40 1 255 255 255 255 Enable the firewall rule for later using Status The name of the Firewall rule Compared with the incoming packets whether Source IP Netmask is matched or not 50 DFL 1500 User Manual Compared with the incoming packets whether Dest IP Netmask 0 0 0 0 Dest IP amp Netmask is matched or not 0 0 0 0 Firewall Service Verified the service of packet is belong to each TCP UDP Any ICMP Forward Block the If packet is matched the rule condition Forward or Block this matched packet matched packet Action Don t log Log the If packet is matched the rule condition Log or Don t log this matched packet matched packet Table 8 1 Insert a Firewall rule Step 4 View the Firewall Log DEVICE Status gt Firewall Logs gt Firewall Logs You can go to DEVICE Status gt Firewall Logs gt Firewall Logs to view the firewall logs If you prefer to download these logs please click the Download To Local button to save the logs to Alert Logs 2003 11 10 13 51 50 2003 11 10 13 51 53 2003 11 10 13 51 56 192 168 40 1 49161 192 168 40 1 49161 192 168 40 1 49161 140 113 1 1 21 140 113 1 1 21 140 113 1 1 21 Block Block Block 2003 11 10 13 51 59 2003 11 10 13 52 03 192 168 40 1 49161 192 168 40 1 49161 140 113 1 1 21 Block localhost 140 113 1 1 21 Block 8 4 2 Setup Alert detected attack Step 1 Setup Attack Alert
36. rule This rule will allow packets from 192 168 88 0 255 255 255 0 pass through DFL 1500 And accomplish the VPN tunnel establishment At DFL 2 Part Ill ADVANCED SETTINGS gt Firewall gt Edit Rules Status Edit Rules Show Rules Attack Alert Summary Edit WAN1 Y to LAN rules Deren farihien ur on Block v Log Apply Packets are top down matched by the rules item Status Condition UT Action Active Name Direction Source IP Address Dest IP Address Service Action Log 1 if Default Oo WANT to LAN Any Any Any Block ADVANCED SETTINGS gt Firewall gt Edit Rules gt Insert Edit Rules Show Rules Attack Alert Page 1 1 Status Summary Firewall gt Edit Rules gt Insert Insert a new WAN1 to WAN1 Firewall rule Activate this rule Rule name Allow yPNIKE rule Source IP 192 168 88 0 Dest IP 192 168 40 0 Netmask 255 255 255 0 Netmask 255 255 255 0 Service Any Configure dest port Type o Single Dest Port to FTP 21 v Range Copy To Dist ADVANCED SETTINGS gt Firewall gt Edit Rules Status Edit Rules Show Rules Attack Alert Summary Firewall gt Edit Rules Edit WANT Y to LAN rules Default action for this packet direction Block v vjLog Apply Packets are top down matched by the rules item Status Condition 0 mmm Actives R 3 Source IP Address Dest BS some tik WANT to Y AllowYPNIKE rule LANT 192 168 68 0 255 255 255 0 192 168 40 0 255 255 255
37. the DMZ1 IE Alias settings Setup IP Address andIP Subnet Mask and determine if you would like to enable the DHCP Server And then select Routing Protocol Click Apply to finish this setting Sl Apply LJ Reset IP Subnet Mask 255 255 255 0 IP Pool Starting Address 10 1 1 1 17 D Link Part I Primary DNS Server Specify the Primary DNS Server IP address of the DHCP information 10 1 1 254 Secondary DNS Server Specify the Secondary DNS Server IP address of the DHCP information Lease time sec Specify DHCP information lease time Determine to enable the dynamic routing protocol RIP to receive RIP Routing Protocol message to send out RIP message if the message is received or not OSPF Area ID Specify OSPF area ID number Table 3 2 Configure DMZ network settings Step 2 Setup LAN port BASIC SETUP gt LAN Settings gt LAN1 Status Here we are going to configure the LAN1 settings tus LAN Status IP Alias Setup IP Address and IP Subnet Mask and determine if you would like to enable the DHCP Server And then select Routing Protocol Click Apply to finish this setting 192 168 40 100 92 168 40 254 IP Subnet Mask 255 255 255 0 IP Pool Starting Address 192 168 40 100 Primary DNS Server 192 168 40 254 message to send out RIP message if the message is received or not Table 3 3 Configure LAN network settings 18 Bas c Setup DFL 1500 User Manual 3 4 3 Setup WAN1 IP alias Step 1 Add WANT IP alias
38. 0 Any Forward N Default Any Block Y Page 1 1 bet Edit Delete Move Before gi Here we will install the IPSec properties of DFL 2 Note that the Local Address and Remote address field are opposite to the DFL 1 and so are My IP Address and Security Gateway Addr field 64 Virtual Private Network IPSec Step 1 Enable IPSec Check the Enable IPSec checkbox and click Apply Step 2 Add an IKE rule Click the IKE hyperlink and click Add to add a new IPSec VPN tunnel endpoint Step 3 Customize the rule Check the Active checkbox Enter a name for this rule like IKErule Enter the Local IP Address 192 168 8050 2002 20390 and the Remote IP Address 192 168 40 0 255 255 255 0 Enter the My IP Address as the public IP address of this Firewall VPN Router 210 2 1 1 Enter the public IP of the opposite side VPN gateway 61 2 1 1 in the Security Gateway Addr Click the ESP Algorithm and select Encrypt and Authenticate DES MD5 Enter the Pre Shared Key as 1234567890 Click the Apply button to store the settings Note in the Action region you should choose either ESP Algorithm or AH Algorithm or system will show error message DFL 1500 User Manual ADVANCED SETTINGS gt VPN Settings gt IPSec IPSec PPTP Y Enable IPS anual Key Edit Modify IPSec Security Associations Local LAN Remote LAN Active Name Mechanism My IP Security Gateway Edit Dele
39. 0 NAT rule for Basic DMZ1 added 2003 12 31 09 37 57 DFL 1500 SYSTEM 55 HTTP started 2003 12 31 09 37 58 DFL 1500 SYSTEM S6 HTTPS started 2003 12 31 09 42 58 192 168 17 170 AUTH 41 admin login success 192 168 17 172 443 2003 12 31 09 43 12 192 168 17 170 AUTH 42 admin logout 192 168 17 172 443 2003 12 31 09 43 19 CLI AUTH admin login from console success 2003 12 31 09 43 21 CMD CLI CLl enable Download To Locat 5 Resh Ger NaP Listfi0 z Per Page Page 1 3 0 0 Y0 MS Wh FIELD DESCRIPTION EXAMPLE e which is occurred by the specified system 2003 12 31 09 37 54 Source IP A type of the specified system events DFL 1500 Access Info The description of the system log SYSTEM S1 Wall Startup 117 D Link Part VII 19 4 2 Syslog amp Mail log Step 1 Setup Syslog Server DEVICE STATUS gt Log Config gt Syslog Server Setup Syslog Server by checking the Enable Syslog Server It Will let DFL 1500 send logs to the Syslog Server specified in the Syslog Server IP Address field Apply Rest Table 19 1 Setup the Syslog Server Step 2 Setup Mail Log method DEVICE STATUS gt Log Config gt Mail Logs Fill in the IP address of the Mail Server and Mail Subject Also fill your E Mail address for receiving logs Select the preferred Log Schedule to mail out logs Click the Apply button to finish the settings 10 1 1 1 Log Report mis dlink com Daily E Apply Rest Wh
40. 0 at 10 1 1 1 to connect to hitps 10 1 1 254 In the DMZ_1 region use a PC located 10 1 1 X to connect DFL 1500 DMZ1 port 10 1 1 254 Type https 10 1 1 254 to configure the DFL 1500 in the web browser Step2 Setup LAN1 IP information BASIC SETUP gt LAN Settings gt LAN1 Status Enter the IP Address and IP Subnet Mask with tus LAN2 Status IP Alias 192 168 40 254 255 255 255 0 and click Apply 192 168 40 254 255 255 255 0 192 168 40 100 192 169 40 254 0 0 0 0 7200 Apply D Reset 2 2 2 From CLI command line interface to configure DFL 1500 LAN1 network settings Step 1 Use Console port to configure PEL 1500 gt en DFL 1500 DFL 1500 ip ifconfig INTF3 192 168 40 254 255 255 255 0 Use the supplied console line to connect the PC to the Diagnostic RS 232 socket of the DFL 1500 PEL 1500 ip ifconfig INTF3 Start a new connection using the HyperTerminal with parameters No Parity 8 Data bits 1 stop bit and baud rate 9600 Enter admin for user name and admin for password to login After logging into DFL 1500 enter the commands LAN1 192 168 40 254 255 255 255 0 en to enter the privileged mode Enter the command ip ireontig INTF3 192 168 40 254 255 255 255 0 to change the IP of the LAN1 interface 14 Bas c Setup DFL 1500 User Manual 3 1 3 4 Chapter 3 Basic Setup In this chapter we will introduce how to setup network settings for each port separately Demand For the ex
41. 011852 ben Er Dee Morde J 12 System Overview DFL 1500 User Manual Chapter 2 System Overview In this chapter we will introduce the network topology for use with later chapters 2 1 Typical Example Topology In this chapter we introduce a typical network topology for the DFL 1500 In Figure 2 1 the left half side is a DFL 1500 with one LAN one DMZ and two WAN links Notice there are five ports in DFL 1500 In this topology we only use one LAN The right half side contains a DFL 1500 connected with one LAN one DMZ and one WAN In this architecture Organization_1 communicates with Organization_2 with a VPN tunnel established by the two DFL 1500 Firewall VPN routers The VPN tunnel secures communications between Organizations more safely On the Internet side there are Web server Mail server DHCP server and FTP server for testing the content filters and the bandwidth management system Organization_1 Organization_2 Private LANs Private LANs DMZ_1 DMZ_2 10 1 1 1 253 10 1 1 1 235 ic O q DHCPServer2 140 114 179 84 LENZI_P 10 1 1 254 VPN Tunnel HS Ee i pm ISP Es LAN1_IP 192 168 40 254 Internet WebServer3 MailServer 140 112 1 4 o 14011213 140 112 1 5 FTPServer2 PC2_1 PC2_2 192 168 40 1 DHCP Client 192 168 88 1 192 168 88 2 LAN 1 192 168 40 1 253 LAN 2 92 168 88 1 25 Figure 2 1 Typical
42. 10 1 1 1 DHCP feature Pool Size 20 Primary DNS Server 10 1 1 254 Step 3 O Apply the Changes secondary DNS Server 0 0 0 0 Click Apply to save your settings Lease time sec 7200 Routing Protocol None OSPF Area ID Apply Reset Step 4 Check NAT Status ADVANCED SETTINGS gt NAT gt Status The default setting of NAT is in Basic Mode Status NAT Rules NAT Virtual Server Sessions Servers Sessions After applying the Step 3 the NAT is automatically configured with three rules to let all Network Address Translation E gt private IP LAN DMZ to WAN requests to be translated with the public IP assigned by the ISP Network Address Translation NAT translates the IP port for 1 LAN DMZ to VVAN traffic map private src IPs and ports to the DFL 1500 s WAN public IPs and ports 2 LANAVAN to DMZ traffic map public dest IPs and ports to the DMZ servers private IPs and ports Modes 1 None The DFL 1500 is in routing mode without performing any address translation 2 Basic The DFL 1500 automatically performs Many to One NAT for all LAN DMZ subnets 3 Full Feature The DFL 1500 can be manually configured with Many to One and Many to Many One to One and bidirectional One to One rules to do policy based NAT Total Configured Rules 3 Vacant Rules 197 Step 5 Check NAT Rules ADVANCED SETTINGS gt NAT gt NAT Rules The DFL 1500 has added three NAT rules The Status NAT Rules _ NAT Virtual Server Sessions Server
43. 16 Intrusion Detection Systems This chapter introduces Intrusion Detection System IDS and explains how to implement it 16 1 Demands Although Firewall settings are correct there may still be some crackers intrude our system Crackers hack into our system through Firewall allowed channels with sophisticated skills Most often they attack specific application servers such as SNMP Web and FTP services in your DMZ 16 2 Objectives 1 Detect any attacks towards our DMZ servers 2 Instantly notify our network administrators what attacks have been detected Organization_1 Private LANs DMZ_1 Internet 10 1 1 1 253 WebServer1 MailS rver1 ber 10 1 1 1 101 12 140 113 179 2 DMZ1_IP 10 1 1 254 switch LAN1_IP WANT IP 192 168 40 254 61 2 1 1 Figure 16 1 Some cracker in the Internet would try to hack our company 16 3 Methods 1 Specify where our Web server is located to let the IDS on the DFL 1500 focus more on the attacks 2 Setup logs to email to the specified email address when the log is full You can also set daily weekly emails to periodically monitor the IDS logs 101 D Link Part V 16 4 Steps Step 1 Enable IDS ADVANCED SETTINGS gt IDS gt IDS Status Check the Enable IDS checkbox Enter the DMZ IP subnet and the designated HTTP server The subnets are specified in the types like 192 168 40 0 24 and 10 1 1 1 32 Check all options and click the App1y button 192 168 40 0 24 10 1 1
44. 3kbps 17 3 Methods 1 Partition the inbound bandwidth 1 544Mbps into two classes the FTP and the Video classes Set the Video class to obtain 441kbps 29 Set the FTP class to obtain 1019kbps and set it to be able to borrow any available bandwidth from others 2 Partition the outbound bandwidth 1 544Mbps into two classes the LANa to LANb 65 1003kbps and the outFTP 30 463kbps classes Set the LANa to LAND to obtain 1Mbps and set it to be able to borrow from other bandwidth 106 Bandwidth Management DFL 1500 User Manual 17 4 Steps 17 4 1 Inbound Traffic Management Step 1 Enable Bandwidth ADVANCED SETTINGS gt Bandwidth Mgt gt Status Management Edit Actions Edit Rules Show Rules Summary Check the Enable Bandwidth Management m checkbox click the Apply FIELD DESCRIPTION EXAMPLE Enable Bandwidth Enable Bandwidth Management feature of DFL 1500 Management Apply Apply the settings which have been configured Clean the filled data and restore the original one Table 17 1 Setup status page of Bandwidth Management Step 2 Setup the LAN1 Link ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Actions Select ANY to LANI to setup traffic that will _ Status transmit by the LAN interface Enter the LAN1 interface bandwidth as 1544kbps Click the Apply button to enforce the LAN1 link bandwidth to be 1544kbps In the table the root class Aey J represents the whole bandwidth of the link
45. 500 is changed it will send requests to the DDNS server to refresh the DNS record As the following Figure 4 1 demonstrated the original DFL 1 has registered WANI ip address 61 2 1 1 on the DDNS server www dyndns org It s domain name address is me dyndns org If the WANI ip address is reassigned by the ISP DFL 1 will update the registered ip address 61 2 1 1 as the assigned one This is the base mechanism of the DDNS 21 D Link Part I Update me dyndns org 61 2 1 1 dynamic WANT IP 01 2 1 1 internet Oo u m Relresh the DNS Record Figure 4 1 DDNS mechanism chart 3 DNS Proxy After activating the DNS proxy mode the client can set its DNS server to the DFL 1500 that 1s send the DNS requests to the DFL 1500 The DFL 1500 will then make the enquiry to the DNS server and return the result to the cl ent Besides the caching mechanism performed by the DNS proxy can also help reduce possible duplicate DNS lookups As the following Figure 4 2 described DFL 1 redirects the DNS request from PCI to the real DNS server 140 113 1 1 51211 Internet Asa DNS proxy oo 140 113 1 1 DNS Server Figure 4 2 DNS Proxy mechanism chart 4 DHCP Relay Activate the DHCP relay mode of DFL 1500 so that the DFL 1500 will become the relay agent and relay the DHCP broadcast to the configured DHCP server As the following Figure 4 3 described DFL 1 redirects the DHCP reque
46. 8 50 fa bd Ethernet address 00 80 c8 50 fa be wd0 drive supports PIO mode 4 Initialized Security Association Processing Current WAN1 IP 192 168 17 87 Netmask Oxffffff00 WAN2 link has not been initialized 192 168 17 254 168 95 1 1 ba DD 10 100 Mb s 10 100 Mb s 10 100 Mb s 10 100 Mb s 10 100 Mb s IPsec Gateway Primary DNS Secondary DNS Resuming NAT RMS FW settings Starting Web based Configurator HTTP started HTTPS started Wed Sep 10 18 13 23 2003 NetOS i386 DFL 1500 tty00 login 120 System Maintenance DFL 1500 User Manual 20 3 Steps for Firmware upgrade from Web GUI Step 1 Download the newest firmware Firmware upgrade site from web site http fwupdate dlinktw com tw Step 2 Upgrade firmware In the System Tools Firmware Upgrade page Select the path of firmware through Browse button and check the Preserve Current System Settings to reserve original settings Click the Upload button to upgrade firmware CADFL 1500 1 43R ALL Upload 20 4 Steps for Factory Reset 20 4 1 Steps for NORMAL factory reset Step 3 Factory reset NetoS i386 DFL 1500 tty00 Enter sys resetconf now to reset the firmware to factory default Then enter sys reboot now to login admin instantly reboot the system Password Welcome to DFL 1500 Firewall VPN Router DFL 1500 gt en DFL 1500 sys resetconf now Resetting Configuration to default DONE Please reboot the system
47. Address 192 168 40 0 255 255 255 0 and the Remote IP Address 192 168 88 0 255 255 255 0 Enter the My IP Address as the public IP address of this Firewall VPN Router 61 2 1 1 Enter the public IP of the opposite side VPN gateway 210 2 1 1 inthe Security Gateway Addr Click the ESP Algorithm and select Encrypt and Authenticate DES MD5 Enter the Pre Shared Key as 1234567890 Click the Apply button to store the settings Note In the Action region lt should choose either ESP Algorithm or AH Algorithm or system will show error message If you hope to set the detailed item of IKE parameter Click the Advanced button in this page Otherwise it is ok to just leave the value default IKE Rule Name Local Address Type IP Address Prefix Len Subnet Mask Condition Pennie Addes ine Determine the method to connect to the local side of VPN Yp by using the remote subnet or the remote single host Status Determine the method to connect to the remote side of VPN by using the local subnet or the local single host The local IP address The local IP Netmask IP Address Prefix Len Subnet Mask Action Negotiation Mode Encapsulation Mode My IP Address Security Gateway Addr This field will activate this IPSec policy rule The name of this IPSec policy The remote IP address The remote IP Netmask Choose Main or Aggressive mode see Chapter 9 for details Choose Tunnel or Transport mode see Chapter 9 for details The IP
48. Click the Run Setup Wizard BASIC SETUP gt Wizard Welcome to the DFL 1500 Web Based Configurator Basic Setup Advanced Settings Connect to the Internet and configure your Intranet using Access the advanced features including IPSEC tunneling L2TP and the Setup Wizard WAN LAN and DMZ settings and DHCP PPTP Servers NAT Virtual Server Static Policy Routing Firewall Server settings Web Mail FTP Content Filters Intrusion Detection Bandwidth Management and Special Applications System Tools Perform firmware upgrade backup and restore settings to Device Status and from local hard drive load default settings and reboot Display Device IP MAC addresses and Firmware Version System your VPN router Log Routing Table Traffic Statistics NAT Sessions and VPN Traffic Statistics Help Get help about your VPN router Setup Wizard A step by step setup wizard will guide you to conggffre your VPN router to connetto your ISP Internet Service Provider Run Setup Wizard Step 3 System Name BASIC SETUP gt Wizard Enter the Host Name and the Domain Name WAN1 IP em followed by clicking the Next DFL 1 Step4 WAN Connectivity BASIC SETUP gt Wizard gt Next To setup the first WAN link make WAN1 as the NA System Default WAN link Gateway DNS Choose _ m ema the type of IP Address Assignment provided by iress Assignm your ISP to access the Internet Here we have four Se types to select This will determine how the I
49. D InkDFL 1500 VPN Firewall Router User Manual D Link Building Networks for People Copyright 2003 D Link Systems Inc All rights reserved No part of this publication including text examples diagrams or illustrations may be reproduced transmitted or translated in any form or by any means electronic mechanical manual optical or otherwise for any purpose w thout prior written permission of D Link Systems Inc DFL 1500 User Manual Version 0 4 January 30 2004 Trademarks Products mentioned in this document are trademarks or registered trademarks of their respective holders Regulatory Compliance FCC Class A Part 15 CSA CUS Table of Contents Part I B3as1 CONIL 2 Chapter T Quick Sara ED A aan 3 1 1 D RO O een ee Nee e m e 3 1 2 Check Your Packa 26 OM Sane kaza dle 3 1 3 Deu Sms ak ab e iel yaa aman Cees Tee rere anal ln ie RER rr ter et aka lie 3 1 4 a banka ay DRETS ae iR e e e e 4 1 5 Derault e el gre iye ot DEL 50022222 Ee e e e e ee 6 1 6 U sinssthe Setup Wizard esse A ee AT sicil seed lala semi 6 1 7 nternete ONCE L N YE aa Maia id 9 1 7 1 LANIO WANT OMMC CUI VIE Vi ietss ses a asa ea 9 1 7 2 WANE DMAIC OACI A EL ze 10 Chapter System OVVIO Wesens 13 2 1 Typical Example Topos see e 13 22 Chanem tie L N EA GELER ee E 13 2 21 From DMZ to configure DFL 1500 LANI network setting 14 2 22 From CLI command line interface to configure DFL 1500 LAN
50. E Sen Ga eek a lila la vi o ce aile e ik a akl lee ame bea lal eee 79 12 4 O YK e Y KN e NE 80 12 4 1 IAN P INC CW Ol o AAA PT 80 Part IV Content Filters ico cios 84 Chapter 13 Content Filtering Web illes ii ein 85 13 1 De mands RN 85 13 2 ODJ ECUN OS ee e del lts e e 86 13 3 MENOS tal oline 86 13 4 A ee HENRI EDDIE liess 87 Chapter IC ontent Biltering Mall Raters a se a ae dillal me lelii 93 14 1 A See a ean ee ee ee er 93 14 2 OD EV I I een 93 14 3 NIE VO Se E e e e ee 93 14 4 SUG STO ry MTE PIOS dl de 94 14 5 SLE PS TOK POPS Filters acess atin at RE eos 95 Chapter TS Content Filtering FIP File ee ei Le lee 97 15 1 mke e Ra e A ias 97 15 2 ODD CCE VS Sica os actos NIT es A EE E O E ais 97 15 3 MENOS O 97 15 4 ODS a RR Lee ee ee 98 Pare Intrusion Detection System anne nase 100 Chapter 16 Intrusion Detection 5 YELE MS inkl 101 16 1 Do a ee ee ee 101 16 2 OD ze ehe ea Bes san a sen ol e ee 101 16 3 MES lod da pie 101 16 4 E lc 102 Bare vi Bandwidth Manasement use aha 104 Chapter TC Bandwidth Mana ce menta o ans 105 17 1 DEMAS ais 105 17 2 A ee er Re e KSM e 106 17 3 IVICTI OCS od A dla 106 17 4 AR ER 107 17 4 1 bound Trato NLamac Md o ii 107 17 4 2 Ultbonnda Matic Management o riada 111 Part VII Sy Sle DIN AI ada era ohaas 114 Chapter 18 Sy Stem Status asus didas dante 115 18 1 PIE DIS re erir ee e eee e T eee err et ee 115 18 2 ODE GENE ne ee NR RE aa Sil e REN 115 18 3 Methods nen ee BEE u ee
51. EXAMPLE Check Enable keyword blocking and then the web pages will be blocked Enable keyword blocking ifthe keywords below you have added are appeared in the pages Limit Enabled limit at __ matches at 3 matches means that the webpages will be blocked as long as any of 3 matches the added keywords appear equal or more than three times sex Specify the keyword that you want to block violence pa mei oo Table 13 8 Web Filter Content Keywords setting page 92 Content Filtering Mail Filters DFL 1500 User Manual Chapter 14 Content Filtering Mail Filters This chapter introduces SMTP proxies and explains how to implement it 14 1 Demands Sometimes there are malicious scripts like vbs that may be attached in the email If the users accidentally open such files their computers may be infectious with virus 14 2 Objectives Modify the filename extension of the suspicious email attachments so that email receivers may notice that the file cannot be directly opened by the operating system because of the unrecognized filename extension 14 3 Methods 1 Setup SMTP filters for outgoing emails from PC_1 in LANI towards the mail server in DMZ1 or in WANI to append a bin to all vbs attachments Use PCI to send an email with vbs attachments to test the configuration 2 Setup POP3 filters for incoming emails from a mail server in WANI or in DMZ1 to PC in LANI to append a bin to all vbs attachments
52. Filter ADVANCED SETTINGS gt Content Filters gt FTP Filter gt FTP gt Add Enter mp3 in the Name field and select Extension Name in the Blocked Type field Click the Add button to apply the change Now users in LANs can never download any mp3 files FIELD DESCRIPTION EXAMPLE Fil ia the file extension or exact flename gt Extension Name When the extension filename of download file is matching the action 1s blocked download from FTP server Blocked Type Extension Name gt Full Name When the exact filename of download file is matching the action 1s blocked download from FTP server Table 15 2 FTP Filter FTP adding filter entry 98 Content Filtering FTP Filtering DFL 1500 User Manual Step 3 Add an Exempt Zone ADVANCED SETTINGS gt Content Filters gt FTP Filter gt FTP Exempt Add a new Exempt Zone record It s IP address Zone gt Add range is between 192 168 40 10 to 192 168 40 30 192 168 40 10 192 163 40 30 FIELD DESCRIPTION EXAMPLE From Address Exempt zone record IP address from 192 168 40 10 To Address Exempt zone record IP address to 192 168 40 30 Table 15 3 FTP Filter add an exempt zone entry Step 4 Show the Exempt Zones ADVANCED SETTINGS gt Content Filters gt FTP Filter gt FTP Exempt Here we can discover that new added Exempt Zone record is appeared 99 D Lin Part V Intrusion Detection System 100 Intrusion Detection Systems DFL 1500 User Manual Chapter
53. I network settings 14 Chapter 3 Basie SEL sera id eg 15 3 1 De manga a a a ee teaeeees 15 3 2 HS 15 3 3 A A ee E ENE E AOE E ATEA 15 3 4 SEPS er ee ee ERITREA e e sauna 15 3 4 1 SEU AN a ee N a e le 16 3 4 2 SEWP DMZL BANT SUS la idos 17 3 4 3 AA alak z AA ee ee EEE 19 Chapter System Losa ee ae Reale 21 4 1 Demnaidtrci A E 21 4 2 OBEN SEE era len ke 21 4 3 INFECTIOUS rss een A ATA IE A I E A E E T 21 4 4 DES PEDA PAA O A A TE ee A oo E A TE E EEE Re 24 4 4 1 General semine ea nos 24 4 4 2 PONS SEMINE cd lid 26 4 4 3 DNS PrO YS INS ee a ee ee ee 21 4 4 4 DHCP Relay nica ld illa 21 4 4 5 Chance DEI SOO IE BE ee isa 28 4 4 6 SNMP C OMO largesi O A ee ee er 28 Chapter Remote Nama semental tios 31 5 1 Demong a ee 31 5 2 Methode asd Ses ohare ee ae ee ted tan Catena e e e 31 3 O ENE E AE Sal dazlak alameti A A E E A AA DER mada aleme 32 33 Ten essen o e e 32 3 2 e e leo o e il e ae 32 3 33 NN A A A NEM ESYA EY AED E YE A KED 32 5 3 4 IEM tt A id 32 Parti Nati Route Errantes 34 Chapter O NAT nae EK add 35 6 1 Demand ke merece O O A 35 6 2 OD ECUVES A A E alel ismin deme 35 6 3 KIEO GR e KE ea E E A 36 6 4 LS Dal e a E sel ee EEE 36 6 4 1 Setup MIMA OnE NAT WIESE 22er iss 36 6 4 2 Setup V trtal Server FORTHE POSE VEL cos 40 Chapter Route nido li yekpare 45 7 1 D ia ee A dee ee 45 1 2 AR RR 45 ha Methods ns elle u Maved latins 46 7 4 te sa e Gl li 46 7 4 1 Add
54. Key hex 1122334455667788 Authentication MDS Y md5 shaf 128 160 bits Key hex 11112222333344445555666677778888 OAH Authentication md sha1 126 160 bits Key Advanced Apply ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key gt Add IPSec PPTP L2TP If you enable the firewall please check whether these firewall rules would block packets in tunnel 2 Packets are blocked by default in the WAN to LAN direction please add a rule to forward these tunneled packets 3 The source address mask and the destination address mask of the firewall rules are 192 168 88 0 255 255 255 0 and 192 168 40 0 255 255 255 0 respectively ok 12 Virtual Private Network IPSec Step 5 Add a Firewall rule Same as that in IKE method Please make sure that the Firewall is enabled Select WAN1 to LAN1 to display the rules of this direction The default action of this direction is Block with Logs We have to allow the VPN traffic from the WAN1 side to enter our LAN1 side So we click the Insert button to add a Firewall rule before the default rule Step 6 Customize the Firewall rule Check the Activate this rule Enter the Rule Name as AllowVPNIKErule Source IP as 192 168 40 0 and Dest IP as 192 168 88 0 Click Apply to store this rule Step 7 View the result Now we have inserted a new rule before the default firewall rule Any packets from 192 168 40 0 24 to 192 168 88 0 24
55. LAN1 1 Yo AllowYPNIKErule 192 168 40 0 255 255 255 0 192 169 59 0 255 255 255 0 Any Forward N E Y Default Any Any Any Block Y Page 1 1 y 73 Virtual Private Network PPTP DFL 1500 User Manual Chapter 11 Virtual Private Network PPTP This chapter introduces PPTP and explains how to implement it 11 1 Demands l One employee in our company may sometimes want to connect back to our coporate network to work on something His PC is PC1_1 in LAN_l instead of DMZ so he cannot directly access the host by simply with virtual server settings This causes inconvenience for the employee to work remotely 2 In our branch office we need to provide PPTP connection methods to connect back to headquater for the internal company employees 11 2 Objectives 1 With PPTP tunneling emulate the mobile employee as a member in LAN after he dials in the corporate network Then he can access all computers in LAN just as if he stays in the office covered by LANI 2 Make sure every employee in the branch office can use the network resource in the headguater Suppose they are in the same internal network and keep the communication security Internet Y a PPTP IP lt DFL 1 ISP 192 168 40 180 Gu ANTP sritdh _192 168 40 254 Mobile employee 211 54 63 PC1_1 i 192 168 40 1 DHCP Client LAN_1 92 168 40 1 25 Figure 11 1 PPTP method connection 11 3 Methods 1 Setup the PPTP server at DFL 1500 Setup th
56. N side lv MZ 10 1 1 1 253 61 214 internet DMZ1 IP 10 1 1 254 WANT IP DFL 1 ote 140 25 1 LAN1_IP Remote Manager 192 168 40 254 a SP2 192 T6840 253 Figure 5 1 Some management method of DFL 1500 31 D Link Part I 5 3 Steps 5 3 1 Telnet Step 1 Setup Telnet SYSTEM TOOLS gt Remote Mgt gt TELNET Check the WANI checkbox Click the Selected _ SSH WWW HTTPS SNMP MSC of Secure Client IP Address and then enter the specified IP address 140 2 5 1 for accessing DFL 1500 And click the Apply 140 2 5 1 li 5 3 2 WWW Step 1 Setup WWW SYSTEM TOOLS gt Remote Mgt gt WWW Check the LAN1 checkbox and enter the new _ TELNET SSH server port 8080 that will be accessed by the user s browser http 192 168 40 254 8080 And click the Apply If you are configuring the DFL 1500 with HTTP your browser will then automatically be directed to the new server port Reset 5 3 3 SNMP Step 1 Setup SNMP SYSTEM TOOLS gt Remote Mgt gt SNMP Check the LAN1 checkbox In the Secure IENEI Client Address field If you prefer indicated specified IP address Just click the Selected and enter the valid IP address for reading the SNMP MIBs at the DFL 1500 Here we click All for all no IP range limitation of clients Finally click the Apply 5 3 4 ICMP Step 1 Setup ICMP SYSTEM TOOLS gt Remote Mgt gt MISC Uncheck the WAN1 WAN2 checkbox and
57. NAT rules by yourself 37 D Link Step 4 Customize NAT Rules In the full feature mode the rules can be further customized Incoming packets from LAN DMZ zones are top down matched by the NAT rules Namely NAT implements first match Select the rule item that you want to do with insert a new rule before it delete It move It before the list box chosen item Part Il ADVANCED SETTINGS gt NAT gt NAT Rules NAT Sessions Virtual Servers Server Status Sessions Item Status Condition Action Active Name Direction Source IP Address Translate Src IP into Type G1 Y BasieDMZI LANDMZIOWAN 10 1 1 254 255 255 255 0 Auto device WANIP MM 02 Y BasieLAN2 LANDMZtOWAN 192 168 2 254 255 255 255 0 Auto device WANIP MI 03 XV BasieLANt LAN DMZtoWAN 192 168 40 254255 255 256 0 Auto device WANIP Mi Step 5 Insert NAT Rule Step 5 a Insert an Many to One Rule As described in the above Many to One NAT is the default NAT rule type in the Basic mode If you have other alias LAN DMZ subnets you can manually add a Many to One NAT rule for them First select the Type as Many to One check the x Activate this rule enter a Rule name for this rule enter the private IP subnet an IP address with a netmask to be translated and enter the public IP address for being translated into You can check the Auto choose IP from WAN ports The DFL 1500 will automatically determine which WAN IP is to be translat
58. Naci Kasim Sk No 5 Mecidiyekoy Istanbul Turkey TEL 90 212 213 3400 FAX 90 212 213 3420 E MAIL smorovati dlink me com U A E D Link Middle East CHS Aptec Dubai P O Box 33550 Dubai United Arab Emirates TEL 971 4 366 885 FAX 971 4 355 941 E MAIL Wxavier dlink me com U K D Link Europe United Kingdom Ltd 4th Floor Merit House Edgware Road Colindale London NW9 5AB United Kingdom TEL 44 020 8731 5555 SALES 44 020 8731 5550 FAX 44 020 8731 5511 SALES 44 020 8731 5551 BBS 44 0 181 235 5511 URL www dlink co uk E MAIL info dlink co uk U S A D Link U S A 17595 Mt Herrmann Street Fountain Valley CA 92708 USA TEL 1 714 885 6000 FAX 1 866 743 4905 INFO 1 877 453 5465 URL www dlink com E MAIL tech dlink com amp support dlink com 141
59. No Encryption from the Data Encryption and click Apply 4 Selectthe Properties gt Networking tab 5 Select L2TP VPN from the VPN Type Make sure the following are selected TCP IP Qos Packet Scheduler 6 Select Apply Editing Windows Registry The default Windows 2000 L2TP traffic policy does not allow L2TP traffic without IPSec encryption You can disable default behavior by editing the Windows 2000 Registry as described in the following steps Please refer to the Microsoft documentation for editing the Windows Registry 1 Use the registry editor regedit to locate the following key in the registry HKEY_LOCAL_MACHINE System CurrentControlSet Services Rasman Parameters 2 Add the following registry value to this key e Value Name ProhibitIpSec e Data Type REG_DWORD e Value 1 3 Save your changes and restart the computer You must add the ProhibitIpSec registry value to each Windows 2000 based endpoint computer of an L2TP or IPSec connection to prevent the automatic filter for L2TP and IPSec traffic from being created When the ProhibitIpSec registry value is set to 1 your Windows 2000 based computer does not create the automatic filter that uses CA authentication Instead it checks for a local or Active Directory IPSec policy 81 D Link Part III Connecting to the L2TP VPN 1 Connect to your ISP 2 Start the dial up connection configured in the previous procedure 3 Enter your L2TP VPN User Name an
60. P ine address of WAN1 is obtained Click Next to proceed i 9 168 95 1 1 0 0 0 0 D Link Step 4 a DHCP client Get IP Automatically DHCP is selected DFL 1500 will request for IP address netmask and DNS servers from your ISP You can use your preferred DNS by clicking the DNS IP Address and then completing the Primary DNS and Secondary DNS server IP addresses Click Next to proceed Step 4 b Fixed IP f Fixed IP Address is selected enter the ISP given IP Address Subnet Mask Gateway IP Primary DNS and Secondary DNS IP Click Next to proceed Step 4 c PPPOE client If PPP over Ethernet is selected enter the ISP given User Name Password and the optional Service Name Click Next to proceed Notice On the current firmware version if you select PPPoE method as the WAN link connection The bandwidth management feature will not be supported Part I BASIC SETUP gt Wizard gt Next gt DHCP System Status System WAN1 IP Name IP Address Assignment Get IP Automatically DHCP V Default WAN link Gateway DNS Get DNS Automatically DNS IP Address Primary DNS 1168 95 1 1 Secondary DNS 0 0 0 0 Routing Protocol None y OSPF Area ID BASIC SETUP gt Wizard gt Next gt Fixed IP System System Name WANT IP Status IP Address Assignment Fixed IP Address M Default WAN link Gateway DNS IP Address 51211 Subnet Mask 255 255 255 0 Gateway IP 61 2
61. PNs but it also supports LAN internetworking PPTP operates at Layer 2 of the OSI model OSPF Open Shortest Path First Open Shortest Path First OSPF is a routing protocol used to determine the correct route for packets within IP networks It was designed by the Internet Engineering Task Force to serve as an Interior Gateway Protocol replacing RIP SMTP Simple Mail Transfer Protocol SMTP Simple Mail Transfer Protocol is a TCP IP protocol used in sending and receiving e mail However since it s limited in its ability to queue messages at the receiving end it s usually used with one of two other protocols POP3 or Internet Message Access Protocol that let the user save messages in a server mailbox and download them periodically from the server VPN Virtual Private Network The key feature of a VPN however is its ability to use public networks like the Internet rather than rely on private leased lines VPN technologies implement restricted access networks that utilize the same cabling and routers as a public network and they do so without sacrificing features or basic security 132 Index backup configuration 122 Bandwidth Management 105 bidirectional 37 38 40 Content Filter FTP Filter 97 Mail Filter 93 Web Filter 85 DDNS 21 DHCP 8 10 16 17 DHCP Relay 21 DNS Proxy 21 factory reset 121 Firewall 49 firmware upgrade 121 IDS Intruction Dection System 101 mail log 118 NAT
62. Select the Properties gt Networking tab 5 Select PPTP VPN from the VPN Type Make sure the following are selected TCP LLP Qos Packet Scheduler 6 Select Apply Connecting to the PPTP VPN 1 Connect to your ISP 2 Start the dial up connection configured in the previous procedure 3 Enter your PPTP VPN User Name and Password 4 Select Connect ADVANCED SETTINGS gt VPN Settings gt PPTP gt Client Es PptpUsers Ber Apply Reset Table 11 2 Setup PPTP Client settings 14 Virtual Private Network L2TP DFL 1500 User Manual Chapter 12 Virtual Private Network L2TP This chapter introduces L2TP and explains how to implement it 12 1 Demands l One employee in our company may sometimes want to connect back to our coporate network to work on something His PC is PCI Tin LAN instead of DMZI so he cannot directly access the host by simply with virtual server settings This causes inconvenience for the employee to work remotely 12 2 Objectives 1 With L2TP tunneling emulate the mobile employee as a member in LAN after he dials in the corporate network Then he can access all computers in LAN just as if he stays in the office covered by LAN WANT IP Brett Internet AS 3 e E L2TP IP DFL 1 ISP 192 168 40 200 n gt LANTAP VPN Tunnel 192 163 40 254 Mobile employee 211 54 63 192 168 40 1 DHCP Client LAN 1 192 168 40 1 253 Figure 12 1 L2
63. TP method connection 12 3 Methods 1 Setup the L2TP server at DFL 1500 LNS L2TP Network Server After dialing up to DFL 1500 DFL 1500 will assign a private IP which falls in the range of the settings in the L2TP server at DFL 1500 Suppose the range is defined as 192 168 40 200 192 168 40 253 the remote host may get an IP of 192 168 40 200 and logically become a member in LAN_1 19 D Link Part III 12 4 Steps 12 4 1 Setup L2TP Network Server Step 1 Enable L2TP LNS ADVANCED SETTINGS gt VPN Settings gt L2TP gt LNS Check the Enable L2TP LNS checkbox enter the LANI IP of the DFL 1 192 168 40 254 inthe Local IP and enter the IP range that will be assigned to the L2TP clients in the Start IP and the End IP fields Enter the IP range in the LAC Start IP and the LAC End IP that will NT the real IP of the remote users In our case since the employee uses 211 54 63 1 so we can fill 211 54 63 1 211 54 63 5 to cover 211 54 63 1 Enter the Username and L2tpUsers oossoo Password that will be used by the an employees during dial up Click the Apply to Apply Reset finish configurations FIELD DESCRIPTION EXAMPLE Enable L2TP LNS Enable L2TP LNS feature of DFL 1500 The Local IP is the allocated IP address in the internal network after default man gateway of L2TP client dials in the DFL 1500 en The Start IP is the allocated starting IP address in the internal network after The End IP is the allocated endin
64. UNE sent out from DFL 1500 will be via this port aan Ethernet ISP vendor Optional So Net The user name of PPPoE account Hey The password of PPPoE account G54688 16 Bas c Setup DFL 1500 User Manual Get DNS Automatically gt Get DNS related Get DNS Automatically information from PPPoE ISP Get DNS DNS IP Address DNS IP Address gt manually specify these Primary Automatically and Secondary DNS Server information Through click Connect or Disconnect button to connect Disconnected Click Connect or disconnect PPPoE line Table 3 1 Detailed information of setup WAN port configuration Step 2 Show the Warning message BASIC SETUP gt WAN Settings gt WANT IP gt PPPoE Note that if you have already enabled Microsoft Internet Explorer bandwidth management ADVANCED SETTINGS gt Bandwidth Mgt gt Enable Bandwidth AN Bandwidth management disabled Bandwidth management will support PPPoE in the future release Management and then select PPPoE in BASIC SETUP gt WAN Settings gt WAN1 IP gt PPPoE as your internet connection it will show you a message indicated as right column to tell you that Bandwidth management will not support PPPoE in this version If you still like to use bandwidth management please try to use another method such as DHCP or Fixed IP to connect Internet 3 4 2 Setup DMZ1 LAN1 Status Step 1 Setup DMZ port BASIC SETUP gt DMZ Settings gt DMZ1 Status Here we are going to configure
65. Use PC1_1 to retrieve an email with vbs attachments to test the configuration imz switch aie jae TANI IP Internet www nthu edu tw 192 168 40 1 192 168 40 2 140 114 x x LAN 1 WebServer3 MailServer3 FTPServer3 140 112 1 4 140 112 1 3 14011215 97 168 40 1 2533 Figure 14 1 Use SMTP POP3 filter functionality to avoid some sensitive e mail directly opened 93 D Link Part IV 14 4 Steps for SMTP Filters Step 1 Enable SMTP Filters ADVANCED SETTINGS gt Content Filters gt Mail Filters gt SMTP Check the Enable SMTP Proxy checkbox and Web Filter Maili ETP Filter click Apply or flename extension ig _n_ l OriginalName Type Mapped Name FIELD DESCRIPTION EXAMPLE Enable SMTP Proxy Enable SMTP Proxy feature of DFL 1500 gt Filename extension When the filename extension of attachment file matches Filename Append bin to E mail extension add the bin extension to the attachment file Filename extension attachments whose gt Exact filename When the whole filename of attachment file matches Exact filename add the bin extension to the attachment file Table 14 1 Mail Filter SMTP setting page Step 2 Add a SMTP Filter ADVANCED SETTINGS gt Content Filters gt Mail Filters gt SMTP Select filename extension enter vbs and click Ada to add a rule This rule will apply to all LAN to DMZ WAN SMTP connections All such SMTP traffic will be examined to
66. With the Firewall enabled the DFL 1500 is status already equipped with an Anti DoS engine within it Normal DoS attacks will show up in the log when detecting and blocking such traffic However Flooding attacks require extra parameters to recognize Check the Enable Alert when attack detected checkbox Enter 100 inthe One Minute High means that DFL 1500 starts to generate alerts and delete the half open states if 100 half open states are established in the last minute Enter 100 in the Maximum Incomplete High means that DFL 1500 starts to generate alerts and delete ADVANCED SETTINGS gt Firewall gt Attack Alert Edit Rules Show Rules half open states if the current number of half open states reaches 100 Enter 10 in the TCP Maximum Incomplete means that DFL 1500 starts to generate alerts and delete half open states if the number of half open states towards a server SYN Flooding attack reaches 10 Check the Blocking time if you want to stop the traffic towards the server During this blocking time the server can digest the loading FIELD DESCRIPTION EXAMPLE Bas Ale ei nn the firewall alert to detect Denial of Service DoS Enabled 51 D Link Part II Denial of Service Thresholds This is the rate of new half open sessions that causes the firewall to start deleting half open sessions When the rate of One Minute High new connection attempts rises above this number the DFL 1500 deletes half open sessions as req
67. a St uc ar OLUM S ML Yama erkenne et asien 46 7 4 2 Add a POliCy FOUN UV oc 47 Chapter Ss Pr Wale O O e e e Eeee sacs Ye e YY 49 8 1 Banani S AEE E E E T A AR 49 8 2 OD E Soa er E TR TA A O A N 49 8 3 MeMO O e er ee e ep 49 8 4 UD Sene AE Slam E A de lada E da 50 8 4 1 Block intemal PC session EAN gt WAN 2 222 ii 50 8 4 2 Setup Alert detected UAC essen esse era 51 Part Virtual Pryate Ne WO AS E 54 Chapter S VPN Technical Introducido 55 9 1 Terminoloey ERA ers 39 9 1 1 WEN ee ee ee se le ee er rennen 55 9 12 IPS A od 55 9 1 3 SECUELAS Alca sic 55 9 1 4 PP SCC Al CO mtn ee A A EEE 55 9 1 5 IAE lernen ia eigenes 55 9 1 6 ENCAPSULADO E E gel 56 9 1 7 FP SEC Protocol a RE RER 57 9 2 Make VPN packets pass through DEE TS ae ee u a 57 Chapter LO Virtual Private Network IPSE Eau sa 59 10 1 Demands sense ER eu een 59 10 2 O 59 10 3 DONS ssa trae occ am ee e b es ne ee ee 59 10 4 O A ON 60 DES MD gt IPSec tunnel the IKE Way ee ec a 60 DES MD5 IPSec tunnel the Manual Key Way riosca ela daa kala ayl ld ama lana baka lo alna anes 67 Chapter 11 Virtual Private Network PPTP ene hademe deal in ae ea ae el 75 11 1 Dean A NS 75 11 2 RC CUI CS ver ee ee da 75 11 3 MIST SA e eats 75 11 4 1 Set p PP TEP Network Severin a ae Ins 76 11 4 2 Setup PPIP Network Client a e 71 Chapter 12 Y rtlal Private N Work PDT Peer 79 12 1 PA O aaa nal mmamilalade 79 122 OEE ME A ae es KE occa ee 79 12 3 NE L N
68. ains a high performance stateful packet inspection SPI Firewall policy based NAT ASIC based wire speed VPN upgradeable Intrusion Detection System Dynamic Routing Content Filtering Bandwidth Management WAN Load Balancer and other solutions in a single box It is one of the most cost effective all in one solutions for enterprises 1 1 Before You Begin Prepare a computer with an Ethernet adapter for configuring the DFL 1500 The default IP address for the DFL 1500 is 192 168 1 254 LAN1 Port 4 with a Subnet Mask of 255 255 255 0 You will need to assign your computer a Static IP address within the same range as the DFL 1500 s IP address say 192 168 1 2 to configure the DFL 1500 1 2 Check Your Package Contents These are the items included with your DFL 1500 purchase as Figure 1 1 They are the following items 1 DFL 1500 Device 1 2 Ethernet cable RJ 45 3 RS 232 console 1 4 CD include User s manual and Quick Guide 1 5 Power code 1 If any of the items are missing please contact your reseller aa gt Figure 1 1 All items in the DFL 1500 package 1 3 Default Settings You should have an Internet account already set up and have been given most of the following information as Table 1 1 Fill out this table when you edit the web configuration of DFL 1500 D Link Part I Default value New value Password admin IP Address Subnet Mask Gateway IP Primary DNS Secondary DNS PPPoE Username PPPoE Password
69. ame outyPN Condition Source IP 192 168 40 0 Dest IP 192 168 88 0 Netmask 255 255 255 0 Netmask 255 255 255 0 Service Any Y Configure src port Type Single Src Port to Range Configure dest port Type Single Dest Port to FTP 21 v Range Queue the matched packets in c hs 112 Bandwidth Management Step 6 View the rules The DFL 1500 is configured to direct outFtpUpload matched packets into the outFTP queue 463kbps outVPN matched packets into the LANa to LANb queue 1003kbps Here we reserve 65 WAN1 bandwidth for the LANa to LANb VPN data to guarantee the data communication between VPN The other traffic will be put into the def_class queue any available bandwidth DFL 1500 User Manual ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Rules _ Status _ Edit Actions ME Status Condition Action Name Direction Source IP Address Dest IP Address Service Action CHE ka SE L Em O2 Y outvPN ANY to WANT 192 168 40 0 255 255 255 0 19216980 02662652550 Any LANatoLAND 03 Y Defaut ANY to WANT An Ay Any el elas 113 Part VII System Maintenance System Status DFL 1500 User Manual Chapter 18 System Status 18 1 Demands l Since we have finished the settings of DFL 1500 we need to gather the device information quickly Then we can have a overview of the system status 18 2 Objectives l We can know the current situation easily through an integrated interface 18 3 Method
70. amp fateen dlink me com D Link Finland Pakkalankuja 7A FIN 0150 Vantaa Finland TEL 358 9 2707 5080 FAX 358 9 2707 5081 URL www dlink fi com D Link France Le Florilege No 2 Allee de la Fresnerie 78330 Fontenay le Fleury France TEL 33 1 3023 8688 FAX 33 1 3023 8689 139 D Link Germany India Italy Japan Netherlands Norway Russia Singapore URL www dlink france fr E MAIL info dlink france fr D Link Central Europe D Link Deutschland GmbH Schwalbacher Strasse 74 D 65760 Eschborn Germany TEL 49 6196 77990 FAX 49 6196 7799300 URL www dlink de BBS 49 0 6192 971199 analog BBS 49 0 6192 971198 ISDN INFO 00800 7250 0000 toll free HELP 00800 7250 4000 toll free REPAIR 00800 7250 8000 E MAIL info dlink de D Link India Plot No 5 Bandra Kurla Complex Rd Off Cst Rd Santacruz East Mumbai 400 098 India TEL 91 022 652 6696 657 8 6623 FAX 91 022 652 8914 8476 URL www dlink india com amp www dlink co in E MAIL service dlink india com amp tushars dlink india com D Link Mediterraneo Srl D Link Italia Via Nino Bonnet n 6 B 20154 Milano Italy TEL 39 02 2900 0676 FAX 39 02 2900 1723 URL www dlink it E MAIL info dlink it D Link Japan 10F 8 8 15 Nishi Gotanda Shinagawa ku Tokyo 141 Japan TEL 81 3 5434 9678 FAX 81 3 5434 9868 URL www d link cojp E MAIL kida d link co jp D Link Benelux Fellenoord 130 5611 ZB Eindhoven The Netherlands TEL
71. ated when I try to enable bandwidth management feature of DFL 1500 Status Bandwidth management will support PPPoE in the future release Figure B 4 Bandwidth management feature can not cooperate with PPPoE feature Ans For the present design you can not turn on bandwidth management in the PPPoE enabled condition If you need to enable bandwidth management please choose the WAN connection method ex DHCP fixed IP 9 Why the Source IP field of System Logs is blank Ang One reason 1s that you may enter Host Name and following by a space like DFL 1500 And enter the Domain Name string like dlink com in the firmware version 1 391B Then the System Name will present as DFL 1500 dlink com After upgrading firmware to upper version ex 1 50R It will appear blank in the Source IP field of System Logs 127 Packet Flow DFL 1500 User Manual Appendix C Packet Flow LAN DMZ C WAN Side LAN DMZ to WAN Outbound Traffic Side poncy route Fi rewall INAT ho is i sniff a Local pane mi AWA i i WAN to DMZ LAN Inbound Traffic Figure C 1 Packet flow diagrams 129 Glossary of Terms DFL 1500 User Manual Appendix D Glossary of Terms CF Content Filter A content filter is one or More pieces of software that work together to prevent users from viewing material found on the Internet This process has two components DHCP Dynamic Host Configuration Protocol
72. ave poor quality Here we will make sure that PC1_2 has the smooth stream quality that must have at least 400 kbps speed rate 105 D Link Part VI DMZ 1 10 1 1 0124 ae vi a FTP Server ge 140 113 179 3 a A e A m Lt n er ISP Router 192 168 40 0 24 492 168 88 0 24 LANa to I JAND 65 1003 kbps Figure 17 2 Use bandwidth management mechanism to shape the data flow on the uplink direction 2 As the above Figure 17 2 illustrates PCa 10 1 1 1 is uploading files to the FTP Server 140 113 79 3 causing the blocking of the VPN transfer from LAN_1 to LAN_2 We want to make sure that the VPN tunnel links is reserved at least 1000 kbps speed rate And the nonuse bandwidth of LANa to LANb will raise the bandwidth of PCa uploading files 17 2 Objectives 1 Guarantee the video quality of the PC1_2 192 168 40 2 The remaining bandwidth can be utilized by the PC1_1 192 168 40 1 to download the mp3 files from FTP Server 140 113 179 3 However when the movie is over the whole bandwidth can be utilized by the PC1_1 2 Reserve at least 1Mbps for the LANa to LAND transfer The DMZ_1 PCs can share the remaining 463kbps for uploading files However when the LANa to LANb traffic has only 300kbps theDMZ PCs can occupy the remaining bandwidth from LANa toLANb 1003kbps 300kbps and add the original bandwidth 463kbps So the total bandwidth is 1 166kbps 1003kbps 300kbps 46
73. chment file Filename extension attachments whose gt Exact filename When the whole filename of attachment file matches Exact filename add the bin extension to the attachment file Table 14 2 Mail Filter SMTP setting page 95 D Link Step 2 Add a POP3 Filter Select filename extension enter vbs and click Ada to add a rule This rule will apply to all DMZ WAN to LAN POP3 connections All such POP3 traffic will be examined to change the filename extension from vbs to vbs bin Step 3 Customize the local zones You can configure to what range the filters will apply to the local zones By default the web filters apply to all computers so the Enforce web filter policies for all computers is selected and the range is 0 0 0 0 255 255 255 255 Delete the default range by clicking the range item and the Delete button Enter the IP range in the Range fields followed by a click of the Ada button to add one address range to the web filter Click Include and Apply if you want web filters to only apply to the specified ranges Click Excl1ude and Apply if you want web filters to apply to all computers except those specified ranges Part IV ADVANCED SETTINGS gt Content Filters gt Mail Filters gt POP3 ADVANCED SETTINGS gt Content Filters gt Mail Filters gt POP3 Exempt Zone FTP Filter 192 168 40 100 192 168 40 130 10 1 1 1 10 1 1 254 96 Content Fil
74. ctivate this rule checkbox Enter the rule name as PC1_1 and enter the IP address Of PC1_1 192 168 40 1 255 255 255 255 Select Block and Log to block and log the matched traffic Click the App1 y to apply the changes ADVANCED SETTINGS gt Firewall gt Status Status Edit Rules Show Rules Attack Alert Summary V Enable Stateful Inspection Firewall The firewall protects against Denial of Service DoS attacks when it is enabled Total Configured Rules 26 Vacant Rules 2974 Apply L Be ADVANCED SETTINGS gt Firewall gt Edit Rules Status Edit Rules Show Rules Attack Alert Summary Firewall Edit LANI to WANT Y rule Default action Tor this packet direction Forward v Log Apply Packets are top down matched by the rules item Status TIO Action Active Name Direction Source IP Address Dest IP Address Service Action Log 1 Y Default LANT to WANT Any Any Any Forward N Page 1 1 ADVANCED SETTINGS gt Firewall gt Edit Rules gt Insert Status Edit Rules Show Rules Attack Alert Summary Firewall gt Edit Rules gt Insert Insert a new WAN1 to WAN1 Firewall rule Activate this rule Rule name PC1_1 Source IP 192 168 40 1 Netmask 255 255 255 255 Dest IP 0 0 0 0 Netmask 0 0 0 0 Service Any Y Configure dest port Type Single Dest Port to FTP 21 Range Copy To Dist Block the matched packet Log v the matched packet FIELD DESCRIPTION EXAMPLE Activate this
75. d Password 4 Select Connect 82 Part IV Content Filters Content Filtering Web Filters DFL 1500 User Manual Chapter 13 Content Filtering Web Filters This chapter introduces web content filters and explains how to implement it 13 1 Demands The downloaded web page will be filtered with ActiveX Java Java Script Cookies components WebServer3 140 112 14 Ji Er Internet PC1 2 192 168 40 2 Figure 13 1 Use web filter functionality to avoid users browsing the forbidden web site l Asthe above Figure 13 1 illustrates someone PC1_1 is browsing the web pages at the WebServer3 The contents of the web pages may include cookies Java applets Java scripts or ActiveX objects that may contain malicious program of users information So we wish to prohibit the user PC1_1 from downloading the forbidden components 85 D Link Part IV The web page which comes from forbidden web site will be filtered out WebServer3 140 112 1 4 Internet Figure 13 2 Use web filter functionality to avoid users view the forbidden web site 2 As the above Figure 13 2 illustrates someone PC1_1 is browsing forbidden web pages on office hours The contents of the web pages may include stock markets violence or sex that will waste the bandwidth of the Internet access link while degrading the efficiency of normal working hours So we wish to prohibit the user PC1_1 from viewing the page on the
76. d or not The policy routing rule name GenlManaRoom Verify 1f the incoming packets belong to the range of the Dest IP Netmask in the policy routing rule 0 0 0 0 0 0 0 0 Service Verify what 1s the service of this packet Configure src port Type Src port Configure dest port Type Dest port Nexthop gateway IP O bii If the packet is matched to this rule which interface does this packet WAN Action sent out to Step 3 View the result Incoming packets from Packets comes from which interface LANI Verify if the incoming packets belong to the range of the Source 192 168 40 192 a E TSE IP Netmask in the policy routing rule 255 259 299 192 Condition Check the dest port of the incoming packets If checked what is the N Check the source port of the incoming packets If checked what is No the range of the port range of the port The next gateway IP address of forwarding interface 61 216 120 148 Table 7 2 Add a policy routing entry Advanced Settings gt Routing gt Policy Route After filling data completely view the policy i Routing routing entries which have been set Step 4 Show the routing table Table Item Status Condition Action pp ie eds eek ner See PP A Advanced Settings gt Routing gt Routing Table Finally click the Routing Table to see all the current routing table information 48 Firewall DFL 1500 User Manual Chapter 8 Firewall This chapter introd
77. d technology 9 1 Terminology Explanation 9 1 1 VPN A VPN Virtual Private Network logically provides secure communications between sites without the expense of leased site to site lines A secure VPN is a combination of encryption tunneling authentication and access control used to transport traffic over the Internet or any insecure TCP IP networks 9 1 2 IPSec Internet Protocol Security IPSec is a standard based VPN that offers flexible solutions for secure data communications across a public network like the Internet IPSec 1s built around a number of standardized cryptographic technigues to provide confidentiality data integrity and authentication at the IP layer 9 1 3 Security Association A Security Association SA is an agreement between two parties indicating what security parameters such as keys and algorithms they will use 9 1 4 IPSec Algorithms There are two types of the algorithms in the IPSec including 1 Encryption Algorithms such as DES Data Encryption Standard and 3DES Triple DES algorithms and 2 Authentication Algorithms such as HMAC MDS RFC 2403 and HMAC SHAI RFC 2404 9 1 5 Key Management Key Management allows you to determine whether to use IKE ISAKMP or manual key configuration in order to setup a VPN gt IKE Phases There are two phases to every IKE Internet Key Exchange negotiation phase 1 Authentication and phase 2 Key Exchange A phase exchange established an IKE SA an
78. d the second one uses that SA to negotiate SAa for IPSec In phase 1 you must mM Choose a negotiation mode Authenticate the connection by entering a pre shared key Choose an encryption algorithm Choose an authentication algor thm Choose a Diffie Hellman public key cryptography key group DHI or DH2 Set the IKE SA lifetime This field allows you to determine how long IKE SA negotiation should proceed before it times out A value of 0 means IKE SA negotiation never times out If IKE SA negotiation times out then both IKE SA and IPSec SA must be renegotiated 55 D Link Part III In phase 2 you mustl mM Choose which protocol to use ESP or AH for the IKE key exchange Choose an encryption algorithm Choose an authentication algorithm Choose whether to enable Perfect Forward Security PFS using Diffie Hellman public key cryptography Choose Tunnel mode or Transport mode Set the IPSec SA lifetime This field allows you to determine how long IPSec SA setup should proceed before it times out A value of 0 means IPSec SA never times out If IPSec SA negotiation times out then the IPSec SA must be renegotiated but not the IKE SA gt Negotiation Mode The phase Negotiation Mode you select determines how the Security Association SA will be established for each connection through IKE negotiations mM Main Mode ensures the highest level of security when the communicating parties are negotiating authentication phase 1 It uses 6
79. ded forward into the IP header to verify the integrity of the entire packet by use of portions of the original IP header in the hashing process gt Tunnel Mode Tunnel mode encapsulates the entire IP packet to transmit it securely A Tunnel mode is required for gateway services to provide access to internal system Tunnel mode is fundamentally an IP tunnel with authentication and encryption This is the most common mode of operation Tunnel mode is required for gateway to gateway and host to gateway communications Tunnel mode communication have two sets of IP headers mM Outside header The outside IP header contains the destination IP address of the VPN gateway M Inside header The inside IP header contains the destination IP address of the final system behind the VPN gateway The security protocol appears after the outer IP header and before the inside IP header 9 1 7 IPSec Protocols The ESP and AH protocols are necessary to create a Security Association SA the foundation of an IPSec VPN An SA is built from the authentication provided by AH and ESP protocols The primary function of key management is to establish and maintain the SA between systems Once the SA is established the transport of data may commence gt AH Authentication Header Protocol AH protocol RFC 2402 was designed for integrity authentication sequence integrity replay resistance and non repudiation but not for confidentiality for which the ESP was desi
80. e Source IP Netmask settings do the Action When destination IP address of incoming packets conforms the Dest IP Netmask settings do the Action Enabled InFTP 140 113 179 3 2332539253235 192 168 40 1 255 255 255 255 i Verify f the service of packet belongs to TCP UDP or Service An Saz ICMP type Condition Configure src port Configure dest port Queue the matched packets n class Apply Apply the settings which have been configured Table 17 5 Add a new Bandwidth Management rule If the service is TCP or UDP we can setup the range of the source ports When selecting the range of source ports 1t can be a single port or a range of ports If the service is TCP UDP we can setup the range of the destination ports When selecting the range of the destination ports 1t can be single port or a range of ports y disabled disabled Allocate these packets which conform this rule to the inFTP classes of the previous setting 110 Bandwidth Management Step 7 View the rules The DFL 1500 is configured to direct inFTP matched packets into the inFTP queue 1019kbps inVideo matched packets into the inVideo queue 447kbps The other traffic will be put into the def class queue any available bandwidth DFL 1500 User Manual ADVANCED SETTINGS gt Bandwidth Mgt gt Edit Rules _ Status _ Edit Actions ltem Status Condition Action ie Ei Dee Mord Ji
81. e objects of Restricted Features to Mail File ETP Filter block the objects Click the Apply button at the bottom of this page Use PC1_1 to browse the web page to see if the objects are blocked If the objects still exist the objects may be cached by the browser Please clear the cache in the web browser close the browser reopen the browser and connect to the web page again Microsoft Internet Explorer 87 D Link Part IV If enabling the Web Proxy all the web pages pass through proxy Only Web Proxy port 3128 will also be verified by DFL 1500 If disabling the Web enabled Proxy all the web pages through will bypass the verification Apply Apply the settings which have been configured Clean the filled data and restore the original Table 13 2 Web Filter setting page Step 4 Customize Categories ADVANCED SETTINGS gt Content Filters gt Web Filter gt Categories With the built in URL database DFL 1500 can Mail Filter FTP Filter _ block web sessions towards several pre defined Categories Of URLs Check the items that you want to block or log Simply click the Block all categories will apply all categories Click Log le amp Block Access If you want to block and log any Ai matched traffic You can customize the Time of di Day to allow such traffic after the office hours such as 9 30 to 17 30 o a ho es FIELD DESCRIPTION EXAMPLE Determine how to deal with the URL types in th
82. e remote PC as the PPTP client After dialing up to DFL 1 DFL 1 will assign a private IP which falls in the range of the settings in the PPTP server at DFL 1 Suppose the range is defined as 192 168 40 180 192 168 40 199 the remote host may get an IP of 192 168 40 180 and logically become a member in LANI 2 Setup the DFL 1500 as the PPTP client Let all the client PCs behind the DFL 1500 They can connect to the network behind PPTP Server by passing through DFL 1500 It sounds like no Internet exists but can connect with each other 75 D Link Part III 11 4 Steps 11 4 1 Setup PPTP Network Server Step 1 Enable PPTP Server ADVANCED SETTINGS gt VPN Settings gt PPTP Check the Enable PPTP checkbox enter the LAN1_IP of the DFL 1 192 168 40 254 in the Local IP and enter the IP range that will be assigned to the PPTP clients in the Start IP and the End IP fields Enter the Username 192 168 40 254 and Password that will be used by the 3 employees during dial up Click the Apply to finish configurations Apply Reset FIELD DESCRIPTION EXAMPLE Enable PPTP Server Enable PPTP feature of the DFL 1500 The Local IP is the allocated IP address in the internal Network after PPTP m client dials in the DFL 1500 nn The Start IP is the allocated starting IP address in the internal network after The End IP is the allocated ending IP address in the internal network after mi PPTP client dials in the DFL 1500
83. ected Exempt Computers rad us button Add the specified IP range which filled in the above Range From N A field Clean the filled data and restore the original one Delete the specified IP range which filled n the above Range From Delete field Table 13 5 Web Filter Exempt Zone setting page Step 7 Further Customize the remote ADVANCED SETTINGS gt Content Filters gt Web Filter gt Customize sites _ Mail Filter FTP Filter Check the Enable Filter List Customization to allow all accesses to the Trusted Domains while disallowing all accesses to the Forbidden Domains Check the Disable all traffic except for trusted domains if you want to only allow the access to the Trusted Domains However if the web objects are set to be blocked by the DFL 1500 in step 3 these allowed accesses will FEE PEE never be able to retrieve these objects Check the www dlink com Don t block to allow the objects for these trusted domains The domains are maintained by enter the address in the Domain field with a click of the Add button To delete a domain click the domain with a click of the Delete button waw stackmarket com FIELD DESCRIPTION EXAMPLE Enable Filter List Enable the Filter List Customization feature of web filter Enabled Customization Disable all web traffic Except the following specified domain range specified by the trusted Enabled except for trusted domains domain All the othe
84. ed into ADVANCED SETTINGS gt NAT gt NAT Rules gt Insert NAT Virtual Server Sessions Sessions Servers Status Condition 192 168 40 0 Many to One v 61 2 1 1 255 255 255 0 Action Apply EXAMPLE enabled Rule Status 192 168 40 0 o Compared with the incoming packets whether Source Condition Source IP Netmask 255 255 255 0 IP Netmask 1s matched or not Map a pool of private IP addresses to a single public IP address chosen from the WAN ports Map a pool of private IP addresses to a pool of public IP pasty la addresses chosen from the WAN ports Map a single private IP address to a single public IP Many to One address chosen from the WAN ports An internal host is fully mapped to a WAN IP address Notice that you must add a firewall rule to forward WAN to LAN DMZ traffic One to One One to One bidirectional 38 NAT DFL 1500 User Manual Auto choose IP from WAN ports Only work in Many to One type the default WAN link is the default source interface for NAT translation Only when all ports are used it will use the next NAT interface Translated Src IP Auto choose IP from WAN ports Another way 1s to specify IP address Netmask by self Step 5 b Rule If your ISP has assigned a range of public IP to your company you can tell DFL 1500 to translate the private IP addresses into the pool of public IP addresses The DFL 1500 will use the first public IP unt
85. egion fill forward to WAN2 with next hop gateway 61 216 120 148 After setting as above the packets which match the condition they will follow the predefined action to forward to the next hop DFL 1500 User Manual Advanced Settings gt Routing gt Static Route Routing Static Route Policy Route Table Type Destination Netmask Gateway Activated Net 140 116 53 0 255 255 255 0 61 216 120 148 Yes Advanced Settings gt Routing gt Policy Route Static Route Policy Route Routing Table Policy Routing gt Edit Rules Packets are top down matched by the rules Status _ Condition i Active Name Direction Source IP Address Dest IP Address Service Forward to next hop Through Advanced Settings gt Routing gt Policy Route gt Insert Routing Table Page 1 1 Static Route Policy Route Policy Routing gt Edit Rules gt Insert Insert a new Policy Routing rule Status _ Y Activate this rule Rule name GenlManaRoom Condition 5 Incoming packets jay from Source IP 192 168 40 192 Netmask 255 255 255 192 Dest IP 0 0 0 0 Netmask 0 0 0 0 Service Any Configure src port Type Single Range Src Port to Configure dest port Type Single Range Dest Port to Forward to WAN Y with next hop gateway IP 61 216 120 148 dl Ne emi 4 D Link Part Il BE FIELD DESCRIPTION EXAMPLE Activate this rule Status Rule name Dest IP amp Netmask The policy routing rule is enable
86. emoteLAN Mechanism MyIP Security Gateway wel aa es Dee 67 D Link Part III Step 3 Customize the rule ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key gt Add Same as those in IKE But there is no pre shared key in the manual key mode Enter the Key for encryption such as 1122334455667788 Enter cane the Key for authentication such as 3 11112222333344445555666677778888 Additionally the Outgoing SPI and Incoming ar SPI have to be manually specified Enter 2222 and 1111 respectively to the Outgoing SPI and the Incoming SPI Click Apply to store the rule 192 168 40 0 255 255 255 0 Subnet Address Y 192 168 88 0 255 255 255 0 Action 1 2 1 3 10237 hex 2222 hex vl o 1122334455667788 hex v ADS h Py Apply O o esen Tm Condition ei My IP Address The IP address of local site DFL 1500 Firewall VPN 61211 Router l The IP address of remote site device like DFL 1500 Security Gateway Addr Firewall VPN Router 210 2 1 1 68 Virtual Private Network IPSec DFL 1500 User Manual The Outgoing SPI Security Parameter Index value Outgoing SPI Notice HEX SPI must be a value between 600 and 2222 600000 Or DEC SPI must be a value between 1500 and 6300000 The Incoming SPI Security Parameter Index value Notice HEX SPI must be a value between 600 and 1111 600000 Or DEC SPI must be a value between 1500 and 6300000 Encapsulation Mode re Tunnel or Transport mode
87. en selecting Weekly in the Log Schedule field we have to choose Day for Sending Logs which day the mail logs will be sent out in the Day for Sending Logs field Apply Apply the configuration in this page Restore the original configuration in this page test the mail logs configuration in this page Table 19 2 Setup the Mail Logs 118 System Maintenance DFL 1500 User Manual Chapter 20 System Maintenance This chapter introduces how to do system maintenance 20 1 Demands l DFL 1500 is designed to provide upgradeable firmware and database to meet the upcoming dynamics of the Internet New features new attack signatures new forbidden URLs and new virus definitions require timely updates to the DFL 1500 This chapter introduces how to upgrade your system with TFTP and Web UI respectively 2 Sometimes one may want to reset the firmware to factory default due to loss of password firmware corrupted configuration corrupted Since DFL 1500 does not have a reset button to prevent careless pressing of it factory default has to be set with web GUI or console terminal Of course when you loss the password you have to use CLI only because you can never enter the web GUI with the lost password 20 2 Steps for TFTP Upgrade 192 168 1 254 There is an inside tftp client embedded in the DFL 1500 device ER aS Figure 20 1 Upgrade Backup firmware from TFTP server 119 D Link Step 1 Setup TFTP server Place
88. et SEL NG ISP2 modem WAN2_IP 192 168 1 1 DHCP Client Figure 1 4 The default settings of DFL 1500 The factory default settings for the DFL 1500 are in the Figure 1 4 and Table 1 1 You can configure the DFL 1500 by connecting to the LAN1 IP 192 168 1 254 from the PC1_1 192 168 1 1 The following section will teach you how to quickly setup the DFL 1500 based on Figure 1 4 1 6 Using the Setup Wizard A computer on your LAN1 must be assigned an IP address and Subnet Mask from the same range as the IP address and Subnet Mask assigned to the DFL 1500 in order to be able to make an HTTPS connection using a web browser The DFL 1500 is assigned an IP address of 192 168 1 254 with a Subnet Mask of 255 255 255 0 by default The computer that will be used to configure the DFL 1500 must be assigned an IP address between 192 168 1 1 and 192 168 1 253 with a Subnet Mask of 255 255 255 0 to be able to connect to the DFL 1500 This address range can be changed later There are instructions in the DFL 1500 Quick Installation Guide if you do not know how to set the IP address and Subnet Mask for your computer Quick Start DFL 1500 User Manual Step 1 Login Connect to https 192 168 1 254 Type admin in the account field admin in the li DFL 1500 Password field and click Login Firewall VPN Router DFL 1500 Firewall DM Route Please E first Step 2 Run Setup Wizard After login to https 192 168 1 254
89. forbidden web site 13 2 Objectives 1 Remove the cookies Java applet Java scripts ActiveX objects from the web pages 2 Prevent users from connecting to the forbidden sites 13 3 Methods 1 Setup content filtering for web objects such as cookies and Java applets 2 Setup content filtering for URL requests For each URL check the pre defined upgradeable URL database self entered forbidden domains and self entered keywords to check 1f the URL is allowed 86 Content Filtering Web Filters DFL 1500 User Manual 13 4 Steps Step 1 Enable Web Filter ADVANCED SETTINGS gt Content Filters gt Web Filter Check the Enable Web Filter checkbox and er Mai Ei click the Apply right on the right side FIELD DESCRIPTION EXAMPLE Enable Web Filter Enable Web Filter feature of DFL 1500 Table 13 1 Enable Web Filter Step 2 Warning of Firewall ADVANCED SETTINGS gt Content Filters gt Web Filter This is awarning saying that if you block any web traffic from LAN to WAN in Firewall the access control is shift to the Web Filter Namely if you A Note that all LAN to WAN initiated WWW sessions are controlled by web filter now Firewall will not block these block someone to access the web at the WAN Ve ERAN side after enabling the web filter he can resume ET accessing the web until you set a content filter rule to block it Step 3 Customize Objects ADVANCED SETTINGS gt Content Filters gt Web Filter Check th
90. g IP address in the internal network after mn L2TP client dials in the DFL 1500 nn LAC Start IP The IP address starting range which is allowed user to dial in LNS server by 21154631 using L2TP protocol LAC End IP The IP address ending range which is allowed user to dial in LNS server by 21154635 using L2TP protocol The account which allows L2TP client user to dial in DFL 1500 L2tpUsers The password which allows L2TP client user to dial in DFL 1500 Dif3wk Table 12 1 Setup L2TP LNS Server settings 192 168 40 254 80 Virtual Private Network L2TP DFL 1500 User Manual Step 2 Setup Windows XP 2000 L2TP Configuring A L2TP Dial Up Connection clients Configure a L2TP dial up connection Goto Start gt Control Panel gt Network and Internet Connections gt Make new connection Select Create a connection to the network of your workplace and select Next Select Virtual Private Network Connection and select Next Give a Name the connection and select Next lf the Public Network dialog box appears choose the Don t dial up initial connection and select Next Inthe VPN Server Selection dialog enter the public IP or hostname of the DFL 1500 to connect to and select Next Set Connection AvailabilitytoOnly for myself and select Next Select Finish Customize the VPN Connection 1 Right click the icon that you have created 2 Select Properties gt Security gt Advanced gt Settings 3 Select
91. gned In applications where confidentiality is not required or not sanctioned by government encryption restrictions an AH can be employed to ensure integrity This type of implementation does not protect the information from dissemination but will allow for verification of the integrity of the information and authentication of the originator gt ESP Encapsulating Security Payload Protocol The ESP protocol RFC 2406 provides encryption as well as some of the services offered by AH ESP authenticating properties are limited compared to the AH due to the non inclusion of the IP header information during the authentication process However ESP is sufficient if only the upper layer protocols need to be authenticated An added feature of the ESP is payload padding which further protects communications by concealing the size of the packet being transmitted 9 2 Make VPN packets pass through DFL 1500 Step 1 Enable IPSec ADVANCED SETTINGS gt VPN Settings gt Pass Through If we need to setup DFL 1500 between the existed IPSec PPTP L2TP connections We need to open up the Firewall blocking port of DFL 1500 in advance Here we provide a simple way You can through enable the IPSec PPTP L2TP pass through checkbox on this page Then the VPN connections of IPSec PPTP L2TP will pass through DFL 1500 As well as DFL 1500 will play the middle forwarding device role 57 Virtual Private Network IPSec DFL 1500 User Manual
92. gt Content Filters gt Web Filter gt Exempt Zone zones Mail Filter ETP Filter You can configure to what range the filters will apply to the local zones By default the web filters apply to all computers so the Enforce web filter policies for all computers S selected and the range is 0 0 0 0 255 255 255 255 Delete the default range by clicking the range item and the Delete button Enter the IP range in the Range fields followed by a click of the Add button to add one address range to the web filter Click Include and a a Apply if you want web filters to only apply to the specified ranges Click Exclude and Apply if you want web filters to apply to all computers except those specified ranges FIELD DESCRIPTION EXAMPLE Exempt Computers Determine which IP range will exempt the verification by the web filter Enforce web filter policies Web filter actives at all the computers not limit range of the IP disabled for all computers addresses 89 D Link Part IV Include specified address ranges in the web filter Web filter will only active at below specified computers enabled enforcement Bau es Except below specified IP address ranges All the other IP address ranges from the web filter disabled range Web filter w ll active totally enforcement 10 1 1 1 10 1 1 254 Rance To bie setup the IP address range for the above Exempt 192 168 40 100 men 192 168 40 130 Apply Apply the above sel
93. he One to One NAT in the above to incorporate the WAN to LAN DMZ feature by selecting the One to One Bidirectional from the Type Note that WAN to LAN DMZ traffic will be blocked by the Firewall in default You have to add a Firewall rule to allow such traffic If you expect a LAN DMZ host to be fully accessed by public Internet users use this mode Note that this mode is extremely dangerous because the host is fully exposed to the Internet and may be cracked Always use Virtual Server rules first ADVANCED SETTINGS gt NAT gt NAT Rules gt Insert NAT Sessions Virtual Servers Status 192 168 40 0 One to One bidirectional Y n 61 2 1 1 Condition Action Au Men How to determine which NAT type is best choice for you Here we have some suggestions as the following table description If the public IP addresses of your company 1s insufficient and you prefer to increase the node which can connect to the internet You can just choose the Many to One type to fit your request If the public IP address of your company is not only one node ex you have applied extra one ISP You Many to Many may use the Many to Many type to make the multiple public addresses shar ng the inbound bandwidth So your inbound and outbound traffic will be more flexible If you just wish one local IP address to connect to the internet and prohibit others to connect to the internet You can specify the One to One type One t
94. il DFL 1500 uses up all source ports for the public IP DFL 1500 will then choose the second public IP from the address pool Select Many to Many from the Type Enter the subnet with an IP address and a netmask Other fields are the same with those of Many to One rules However the DFL 1500 will no longer choose the device IP for you It will choose the IP from the address pool you have entered Insert an Many to Many Insert an One to One Rule Though you may have many public IP address for translation you may want to make some private IP to always use a public IP In this case you can select One to One from the Type and enter the private public IP address pair in the Source IP and the Translated Source IP fields Step 5 c Table 6 2 Add a NAT rule ADVANCED SETTINGS gt NAT gt NAT Rules gt Insert NAT Sessions Server Sessions Virtual Status ervers Status v 192 168 40 0 Many to Many v Condition 255 255 255 0 Action 61 2 1 1 255 255 255 252 Back AAN ADVANCED SETTINGS gt NAT gt NAT Rules gt Insert Sessions Virtual Servers Server Sessions Status FI Rule Be A Re Condition Action 39 Part Il D Link Step 5 d Insert a One to One Bidirectional Rule The above three modes allow LAN DMZ to WAN sessions establishment but do not allow WAN to LAN DMZ sessions WAN to LAN DMZ sessions are allowed by Virtual Server rules You can make t
95. ill in the IP Address Subnet Mask Gateway IP And then enter the other DNS IP Address Routing Protocol fields Click Apply to finish this setting 61 2 1 254 168 95 1 1 0 0 0 0 None Ay Res ra an FIELD DESCRIPTION EXAMPLE Default WAN link When Default WAN link is enabled All the packets Enabled Gateway DNS sent out from DFL 1500 will be via this port Get DNS Automatically gt Get DNS related Get IP Get DNS Automatically or information from DHCP Server Get DNS DNS IP Address DNS IP Address gt manually specify these Primary Automatically Automatically and Secondary DNS Server information DHCP Determine to enable the dynamic routing protocol to Routing Protocol receive RIP message to send out the RIP message if the None RIP message is received or not OSPF Area ID Specify OSPF area ID number MN When Default WAN link is enabled All the packets Sau ey sent out from DFL 1500 will be via this port ae es 61 2 1 1 IP Address Subnet Mask Specified IP address and subnet mask 255 255 255 0 Fixed IP Gateway IP Default gateway IP address 61 2 1 254 Address DNS IP Address Specified Primary and Secondary DNS Server address 168 95 1 1 Determine to enable the dynamic routing protocol to Routing Protocol receive RIP message to send out the RIP message if the None RIP message is received or not OSPF Area ID Specify OSPF area ID number Le PPP over When Default WAN link is enabled All the packets DEUTZ
96. is page Log Log Block A arouae amp Block Access Log Only Block Only Access Block all categories Make all categories below enabled disabled Violence Profanity Gross Depictions Oak ecir yonyoulli icn bi Enable the checked Militant Extremist etc items ones Time of Day The me which was set for Web Filter 09 30 17 30 Apply Apply the settings which have been configured N A Reset Clean the filled data and restore the original one N A Table 13 3 Web Filter Categories setting page 88 Content Filtering Web Filters DFL 1500 User Manual Step 5 Update the Built in Database ADVANCED SETTINGS gt Content Filters gt Web Filter gt Database Click the Download button to ask DFL 1500 to Update instantly download the database from the fwupdate dlinktw com tw The DFL 1500 can be set to automatically check the site for any new updates by checking the Automatic Download You can also configure how frequently the DFL 1500 checks for the updates Click Apply to store the changes From now on any traffic matched with the URLs in the database will be blocked by the DFL 1500 y Mail Filter FTP Filter FIELD DESCRIPTION EXAMPLE List Server Determine the URL database website to download from default is frrupdatedlinktw comitw fwupdate dlinktw com tw Automatic Download enabled Update Schedule On Sunday At 03 00 Table 13 4 Web Filter database update Step 6 Further Customize the local ADVANCED SETTINGS
97. ity ICMP 19216817175 192 168 17 150 11 36 19 Undefined Codel 2004 01 07 2 SCAN SOCKS Proxy Attempted Information TCP 192 168 17 150 48958192 168 17 175 1080 11 36 20 attempt Leak 2004 01 07 2 SNMP Agent tcp request Attempted Information TCP 192 168 17 150 48966192 168 17 175 705 11 36 21 Leak Step 4 Update Attack Patterns ADVANCED SETTINGS gt IDS gt Update Rule IDS attack patterns require frequent updates because there are many new attacks every week Please check your DNS settings and click Apply The DFL 1500 will connect to fwupdate dlinktw com tw to fetch any new signatures 103 Part VI Bandwidth Management Bandwidth Management DFL 1500 User Manual Chapter 17 Bandwidth Management This chapter introduces bandwidth management and explains how to implement it 17 1 Demands FT p in e Video Sirin Server _ 40 113 199 7 140 113 179 4 Internet ger a gt in Y 7 i gt r a e ete PEA HE H F f u j PF i 4 ine ee Download file Watch video Se LAN_1 if gt 192 168 40 0 24 lt Figure 17 1 Use bandwidth management mechanism to shape the data flow on the downlink direction As the above diagram Figure 17 1 illustrates PC1_1 is downloading the MP3 files from the FTP Server 140 113 179 3 This occupies the bandwidth of PC1_2 who is watching the video provided by the Video Stream Server 140 113 179 4 causing the video to be blocked and to h
98. ive FTP client to maximize e the compatibility of the FTP protocol This is useful if you want to provide connectivity to nn passive FTP clients For passive FTP clients the server will return them the private IP address and the port number for them to connect back to do data transmissions Since the private IP from them cannot be routed to our zone the data connections would fail After enabling this feature Welk sucwnipert the DFL 1500 will translate the private IP port into ae an IP port of its own Thus the problem is gracefully solved Click Apply to proceed PO A y EI OS FIELD DESCRIPTION EXAMPLE E Activate this rule The Virtual Server rule 1s enabled or not tatus Rule name The Virtual Server rule name The public IP address and IP netmask of the Virtual 61 2 1 1 eS Service Any TOP or UDP Dest Port The port number in the internet 44444 If the Passive FTP client is checked it will connect to the Passive FTP client internal DMZ FTP server of DFL 1500 when FTP client enabled uses passive mode Otherwise t will not work The port number which is actually transferred to the Translated dest port internal DMZ Table 6 4 Adda Virtual Server rule Translated dest IP The IP address which is actually transferred to the 10115 internal DMZ Action 42 NAT Step 9 View the Result Now any request towards the DFL 1500 s WAN1 IP 61 2 1 1 with port 44444 will be translated into a request towards 10 1 1
99. k if ready or not a Check Basic Setup gt DMZ Settings gt DMZI status fields Verify whether any data is correctly b Check Device Status gt System Status gt Network Status DMZI status is UP If the status is DOWN check if the network line is connectionless C Check System Tools gt Remote Mgt gt DMZ1 Verify if DMZ1 port checkbox is enabled The default enabled port is only LAN port 5 Ihave already set the WANI ip address the same subnet with my pc configurator but I can t use https to login DFL 1500 via WANI port all the time why Ans a Be sure that you can ping the WANI port please check the procedure as question 4 description b Notice that you must check System Tools gt Remote Mgt gt HTTPS gt WANI The default enabled port is only LAN port 6 can t build the VPN IPSec connection with another device at the another side all the time why Ansl Please make sure if you follow the setting method as follows a Check your IPSec Setting Please refer to the settings in the Section Step 3 b Make sure if you have already added a WAN to LAN policy in the Advanced Settings Firewall to let the IPSec packets pass through the DFL 1500 The default value from WAN to LAN is block When you add a Firewall rule the Source IP and Netmask are the IP address Subnet Mask in the pages of the Remote Address Type And the Dest IP and Netmask are the IP Address Subnet Mask in the pages of
100. min update system clock and proceed by entering the target date FIELD DESCRIPTION EXAMPLE NTP time server address Use NTP time server to auto update date time value Continuously every 3 min System will update system date time value every 3 minutes to NTP time Enabled update system clock sever Update system clock using System will update system date time value to the NTP time server at boot disabled the time server at boot time time Manual Time Setup Manual setting Time amp Date value Table 4 3 System Tools Time Data menu SE Step 4 Setup Timeout SYSTEM TOOLS gt Admin Settings gt Timeout Select the target timeout e g 10 min fromthe General DDNS DNS Proxy DHCP Relay Password Time Date T System Auto Timeout Lifetime Click the Apply button Now the browser will not timeout for the following 10 minutes after your last touching of it O w e 105 25 D Link Part I FIELD DESCRIPTION EXAMPLE System Auto Timeout When system is idle for a specified time system will force the people Lifetime who logins into the system will logout automatically Table 4 4 System Tools Timeout menu Step 5 Configure Services SYSTEM TOOLS gt Admin Settings gt Services We can configure the service name and numeric General PONS Fassword Time ate Timeout Interface port number as the same group so you can simply use the domain name for the configuration in the DFL 1500 If you wan
101. mn m The account which allow PPTP client user to dial in DFL 1500 PptpUsers The password which allow PPTP client user to dial in DFL 1500 Dif3wk Table 11 1 Setup PPTP Server Step 2 Setup Windows XP 2000 PPTP Configuring A PPTP Dial Up Connection clients Configuring a PPTP dial up connection Goto Start gt Control Panel gt Network and Internet Connections gt Make new connection Select Create a connection to the network of your workplace and select Next Select Virtual Private Network Connection and select Next Give a Name the connection and select Next Ifthe Public Network dialog box appears choose the Don t dial up initial connection and select Next Inthe VPN Server Selection dialog enter the public IP or hostname of the DFL 1500 to connect to and select Next Set Connection AvailabilitytoOnly for myself and select Next Select Finish 16 Virtual Private Network PPTP 11 4 2 Setup PPTP Network Client Step 1 Enable PPTP Client Fill in the IP address of PPTP Server and allocates Username Password When connecting to the PPTP Server successfully it will appear the allocated IP address for the PPTP client in the Assigned IP field DFL 1500 User Manual Customize the VPN Connection 1 Right click the icon that you have created 2 Select Properties gt Security gt Advanced gt Settings 3 Select No Encryption from the Data Encryption and click Apply 4
102. nmark Egypt Finland France D Link Australia 1 Giffnock Avenue North Ryde NSW 2113 Sydney Australia TEL 61 2 8899 1800 FAX 61 2 8899 1868 TOLL FREE Australia 1800 177100 URL www dlink com au E MAIL support dlink com au amp info dlink com au D Link Brasil Ltda Edificio Manoel Tabacow Hydal Rua Tavares Cabral 102 Sala 31 05423 030 Pinheiros Sao Paulo Brasil TEL 55 11 3094 2910 to 2920 FAX 55 11 3094 2921 E MAIL efreitas dlink cl D Link Canada 2180 Winston Park Drive Oakville Ontario L6H 5W1 Canada TEL 1 905 829 5033 FAX 1 905 829 5095 TOLL FREE 1 800 354 6522 URL www dlink ca FTP ftp dlinknet com E MAIL techsup dlink ca D Link South America Sudamerica Isidora Goyenechea 2934 Of 702 Las Condes Fono 2323185 Santiago Chile S A TEL 56 2 232 3185 FAX 56 2 232 0923 URL www dlink cl E MAIL ccasassu dlink cl tsilva dlink cl D Link China 15 Floor Science amp Technology Tower No 11 Baishigiao Road Haidan District 100081 Beijing China TEL 86 10 68467106 FAX 86 10 68467110 URL www dlink com cn E MAIL liweiiOdigitalchina com cn D Link Denmark Naverland Denmark Naverland 2 DK 2600 Glostrup Copenhagen Denmark TEL 45 43 969040 FAX 45 43 424347 URL www dlink dk E MAIL info dlink dk D Link Middle East 7 Assem Ebn Sabet Street Heliopolis Cairo Egypt TEL 202 245 6176 FAX 202 245 6192 URL www dlink me com E MAIL support dlink me com
103. ny Table 4 1 System Tools General Setup menu Step 2 Change Password SYSTEM TOOLS gt Admin Settings gt Password Enter the Current password in the Old Password General DDNS Time Date Timeout Services Interface field Enter the new password in the New Password and retype it in the Retype to Confirm field Click Apply 24 System Tools DFL 1500 User Manual FIELD DESCRIPTION EXAMPLE Old Password The or ginal password of administrator The new selected password 12345 Confirm Password Double confirm the new selected password 12345 Table 4 2 Enter new password Step 3 Setup Time Date SYSTEM TOOLS gt Admin Settings gt Time Date Select the Time Zone where you are located _Seneral DDNS DNS Proxy DHCP Relay Password Timeout Services Interface Enter the nearest NTP time server in the NTP time server address Note that your DNS must be set if the entered address requires GMT 08 00 Beijing Hong Kong Perth Singapore Taipei domain name lookup You can also enter an IP address instead Check the Continuously every 3 min update system clock and click Apply The DFL 1500 will immediately update the system time and will periodically update it Check the Update system clock ho bo using the time server at boot time and 2003 m click Apply if you want to update the clock at each boot If you want to manually change the Apply Reset system time uncheck the Continuously every 3
104. o One bidirectional If you wish to expose the local pc onto the internet and open all internet services outside You can specify the One to One bidirectional type This will make the local pc you specified fully exposed to the internet Additionally you must add a firewall rule to allow WAN to LAN traffic forward Then you can finish the settings Be careful to use this type or 1t will endanger your network security Table 6 3 The NAT type comparison Step 6 View the LAN to WAN Sessions ADVANCED SETTINGS gt NAT gt NAT Sessions Virtual Servers Server Sessions Click the NAT Sessions to see the sessions between LAN to WAN Status NAT Rules DFL 1500 Remote Server Item Local Client 6 4 2 Setup Virtual Server for the FtpServer1 Step 1 Device IP Address BASIC SETUP gt DMZ Settings gt DMZ1 Status Setup the IP Address and IP Subnet Mask for the DFL 1500 of the DMZ1 interface 40 NAT Step 2 Client IP Range Enable the DHCP server if you want to use DFL 1500 to assign IP addresses to the computers under DMZ1 Here we make the DHCP feature enabled Step 3 Apply the Changes Click Apply to save your settings Step 4 Check NAT Status The default setting of NAT is in Basic Mode After applying the Step 3 the NAT is automatically configured with three rules to let all private IP LAN DMZ to WAN requests to be translated with the public IP assigned by the ISP Step 5 Check NAT Rule
105. of encodings as well as some specific bugs This option normalizes RPC multiple fragmented records into a single unfragmented record It does this by normalizing the packet into the the packet buffer If Stateful Inspection option is enabled it will only process client side traffic It defaults to running on ports 111 and 32771 Back Orifice Detector This option will enable the detection of Back Orifice Normalize RPC Traffic enabled 102 Intrusion Detection Systems DFL 1500 User Manual This option will normalize telnet control protocol characters from the session data It accepts a list of ports to run on as arguments It defaults to running on ports 21 23 25 enabled and 119 ARP Spoof Detection This option will enable the detection of ARP Spoof Table 16 1 IDS option list explanation Normalize Telnet Negotiation String Step 2 Setup Logs DEVICE STATUS gt Log Config gt Mail Logs Enter the Mail Server IP Address Mail esse Subject andthe email address that you want to receive from Select the Log Schedule of emailing the logs to your email server 10 1 1 1 DS mis dlink com Hourly Y Step 3 View logs DEVICE STATUS gt IDS Logs If there are attacks towards the WAN port from the public Internet there will be logs describing 2004 01 07 3 ICMP PING Undefined Misc activity ICMP 192 168 17 150 192 168 17 175 the details 11 36 18 Code 2004 01 07 3 ICMP Echo Reply Misc activ
106. onfigured with Many to One and Many to Many One to One and bidirectional One to One rules to do policy based NAT Total Configured Rules 3 Vacant Rules 197 ADVANCED SETTINGS gt NAT gt NAT Rules NAT Virtual Sessions Servers Server NAT Rules Sessi essions Status NAT gt Edit Rules Packets are top down matched by the rules tem Status Condition ction Active Name Direction Source IP Address Translate Src IP into Type Ml Y Basic DMZ1 LAN DMZto WAN 10 1 1 254 255 255 2550 Auto device WAN IP M1 Basic LAN2 LAN DMZ to WAN 192 168 2 254 255 255 255 0 Auto device WAN IP M 1 Basic LAN1 LAN DMZ to WAN 192 168 1 254 255 255 255 0 Auto device WAN IP M 1 Page 1 1 This section tells you how to provide an FTP service with a server installed under your DMZI to the public Internet users After following the steps users at the WAN side can connect to the FTP server at the DMZ side 10 Quick Start DFL 1500 User Manual Step 1 Device IP Address BASIC SETUP gt DMZ Settings gt DMZ1 Status Setup the IP Address and IP Subnet Mask for PMZI Status 1P Alias the DFL 1500 of the DMZ1 interface DMZ1 TCP IP Step 2 Client IP Range IP Address 10 1 1 254 IP Subnet Mask 255 255 255 0 Enable the DHCP server if you want to use DHCP Setup DFL 1500 to assign IP addresses to the v Enable DHCP Server computers under DMZ1 Here we do not enable IP Pool Starting Address
107. ow to Resetting Configuration to default DONE instantly reboot the system Please reboot the system DFL 1500 sys reboot now Rebooting 20 5 Steps for Backup Restore Configurations Step 1 Backup the current SYSTEM TOOLS gt System Utilities gt Backup Configuration configuration In the System Tools System Utilities Backup Configurations page click Backup button to backup configuration file to local disk Step 2 Restore the previous saving SYSTEM TOOLS gt System Utilities gt Restore Configuration configuration In the System Tools System Utilities Restore Configurations page First click the Browse button to select firmware path and then click Upload button to restore configuration CAcont20031103 bin Upload 122 Command Line Interface CLI DFL 1500 User Manual Appendix A Command Line Interface CLI You can configure the DFL 1500 through the web interface http https for the most time Besides you can use another method console ssh telnet method to configure the DFL 1500 in the emergency This is known as the Command Line Interface CLI By the way of CLI commands you can effectively set the IP addresses restore factory reset reboot shutdown system etc Here we will give you a complete list to configure the DFL 1500 using the CLI commands A1 Enable the port of DFL 1500 If you prefer to use CLI commands you can use it through console ssh telnet methods For using ssh telnet feature you
108. r URL domain IP addresses are all blocked access 90 Content Filtering Web Filters DFL 1500 User Manual zen nr In the following domain range of the trusted domains If there are include Java ActiveX Cookies Web Java ActiveX Cookies Web Proxy components in the web page the Enabled Proxy to trusted domain ened ae action 1s setting not to block Trusted Domains www dlink com tw Here we can specify the Trusted Domains for the above item using Domain www dlink com Forbidden Domains www sex com Here we can specify the Forbidden Domains for the above item using Domain www stockmarket com Table 13 6 Web Filter Customize setting page Step 8 Setup URL keyword blocking ADVANCED SETTINGS gt Content Filters gt Web Filter gt Domain Check the Enable Keyword Blocking to block Name any URLs that contains the entered keywords Add a key word by entering a word in the keyword field followed by a click of Add browser The contents about the URL will be block Table 13 7 Web Filter Domain Name setting page 91 D Link Part IV Step 9 Setup contents keyword ADVANCED SETTINGS gt Content Filters gt Web Filter gt Keyword blocking Mail Filter ETP Filter Check the Enable Keyword Blocking to block any Web pages that contain the entered keywords Add a key word by entering a word in the Keyword field and then click Add to proceed Note that you can add the keywords as many as you like FIELD DESCRIPTION
109. r to monitor the system status network status of DFL 1500 28 System Tools DFL 1500 User Manual Ge The community which can get the SNMP information Here il y community is something like password P T The community which can get the SNMP information Here a y community is something like password P Trusted hosts The IP address which can get or set community from the DFL 1500 192 168 1 5 The community which will send SNMP trap Here community is Trap community ee trap comm something like password Trap destination The IP address which will send SNMP trap from the DFL 1500 192 168 1 5 29 Remote Management DFL 1500 User Manual Chapter 5 Remote Management This chapter introduces remote management and explains how to implement it 5 1 Demands Administrators may want to manage the DFL 1500 remotely from any PC in LAN_1 with HTTP at port 8080 and from WAN_PC with TELNET In addition the DFL 1500 may be more secure 1f monitored by a trusted host PC1_1 What s more the DFL 1500 should not respond to ping to hide itself The remote management function in DFL 1500 devices 1s implemented by hidden Firewall rules 5 2 Methods Only allow management by WAN_PC 140 2 5 1 atthe WANI side Administrators can use browsers to connect to http 192 168 40 254 8080 for management Allow SNMP monitoring by PC1_1 192 168 40 1 at the LANI side Do not respond to ICMP ECHO packets at the WANI WA
110. rl Setup Virtual Server at DFL 1500 to redirect any connections towards some port of WANT to the port 21 at the FTPServerl Intranet DMZ_1 10 1 1 1 24 j direct to FTP Server 10 1 1 5 21 or gt Internet 61 2 1 1 44444 A FTP request port 44444 Figure 6 2 DFL 1500 plays the role as Virtual Server As the above Figure 6 2 illustrates the server 10 1 1 5 provides FTP service But it is located on the DMZ region behind DFL 1500 And DFL 1500 will act as a Virtual Server role which redirects the packets to the real server 10 1 1 5 And you can announce to the internet users that there exists a ftp server ip port is 61 2 1 1 44444 So all the internet users will just connect the 61 2 1 1 44444 to get ftp service 6 4 Steps 6 4 1 Setup Many to one NAT rules Step 1 Enable NAT ADVANCED SETTINGS gt NAT gt Status Select the Basic from the list of Network Sessions Servers Sessions Address Translation Mode Click Apply Now the DFL 1500 will automatically set the NAT rules for LAN DMZ zones Namely all internal networks can establish connections to the outside world if the WAN settings are correct 36 NAT DFL 1500 User Manual FIELD DESCRIPTION EXAMPLE None The DFL 1500 is in routing mode without performing any address translation Basic The DFL 1500 automatically performs Many to One NAT for all Network Address Translation Mode LAN DMZ subnets Full Feature
111. rovide connectivity to passive FTP clients For passive FTP clients the server at DMZ will return them the private IP address 10 1 1 5 and the port number for the clients to connect back for data transmissions Since the FTP clients at the WAN side cannot connect to a private IP ex 10 1 1 5 through the internet The data connections would be fail After enabling this feature the DFL 1500 will translate the private IP port into an IP port of its own Thus the problem is gracefully solved Click Apply to proceed Step 9 View the Result Now any request towards the DFL 1500 s WANT IP 61 2 1 1 with dest port 44444 will be translated into a request towards 10 1 1 5 with port 21 and then be forwarded to the 10 1 1 5 The FTP server listening at port 21 in 10 1 1 5 will pick up the request Part I ADVANCED SETTINGS gt NAT gt Virtual Servers Status NAT Rules S NAT E A essions essions Item Status Condition Action _ Active Name Direction Dest IP Address Service Translate dest IP port into A insert 4 7 hw Delete ADVANCED SETTINGS gt NAT gt Virtual Servers gt Insert Sessions Server essions Condition 255 255 255 255 5 mm Well known port Action ADVANCED SETTINGS gt NAT gt Virtual Servers Sessions Sessions item Status Condition Action Active Name Direction DestIPAddress Service Translate dest IP port into 1 Y frene LANMWANIODMZ 6121 1 255 2552550 Tram 1
112. s 1 Through DEVICE STATUS gt System Status path we can get the needed information 18 4 Steps Step 1 System Status DEVICE STATUS gt System Status gt System Status Here we can see the system information include Meme DHCP Table system name firmware version and the full list of each port settings Step 2 Network Status DEVICE STATUS gt System Status gt Network Status We can know the port status here whether the port is up or down and view the amount of the transmitted packets or received packets in each port 115 D Link Step 3 CPU 8 Memory We can know the device information include system user interrupt and memory utilization through the graphic interface Note If you can not view the graphic correctly the situation may result from that you don t install the java virtual machine JVM onto your browser Simply go to the following link http java sun com 2se 1 4 2 download html And then download the Java 2 Platform Standard Edition JRE to your platform ex windows After installing JRE properly you will see the CPU amp Memory graphic as right side Step 4 DHCP Table Through the DHCP Table we can recognize which IP has been allocated by the DHCP server And know which pc MAC address has been leased this IP address DEVICE STATUS gt System Status gt CPU 8 Memory System Status Status DEVICE STATUS gt System Status gt DHCP Table System Ne
113. s The DFL 1500 has added three NAT rules The rule Basic DMZ1 number 1 means that when matching the condition requests of LAN DMZ to WAN direction with its source IP falling in the range of 10 1 1 254 255 255 255 0 the request will be translated into a public source IP requests and then be forwarded to the destinations Step 6 Setup IP for the FTP Server Assign an IP of 10 1 1 1 255 255 255 0 to the FTP server under DMZ1 Assume the FTP Server is at 10 1 1 5 And it is listening on the well known port 21 DFL 1500 User Manual DMZ1 Status IP Alias DMZ1 TCP IP IP Address 10 1 1 254 IP Subnet Mask 255 255 255 0 DHCP Setup Y Enable DHCP Server IP Pool Starting Address 10 1 1 1 Pool Size 20 Primary DNS Server 10 1 1 254 0 0 0 0 7200 Secondary DNS Server Lease time sec Routing Protocol None OSPF Area ID Apply ADVANCED SETTINGS gt NAT gt Status NAT Sessions Virtual Servers Server Status Sessions NAT Rules Network Address Translation Mode Basic v Network Address Translation NAT translates the IP port for 1 LAN DMZ to WAN traffic map private src IPs and ports to the DFL 1500 s WAN public IPs and ports 2 LANAVAN to DMZ traffic map public dest IPs and ports to the DMZ servers private IPs and ports Modes 1 None The DFL 1500 s in routing mode without performing any address translation 2 Basic The DFL 1500 automatically performs Many to One NAT for all LAN DMZ
114. s gt DNS Proxy Check the Enable DNS Proxy and click the _ General BONS N xy DHCP Relay Password Time Date Timeout Services Interface Apply to store the settings From now on your MM e o ___ LAN DMZ PCs can use DFL 1500 as their DNS server as long as the DNS server for DFL 1500 gt has been set in its WAN settings ME ee emdi FIELD DESCRIPTION EXAMPLE When the host ofthe LAN DMZ sends a DNS Request DFL 1500 will request for forwarding it to the DNS server of the Default WAN link When there is a response from DNS DFL 1500 will forward it back to the host of the LAN DMZ Enable DNS Proxy Enabled Table 4 7 System Tools DNS Proxy menu 4 4 4 DHCP Relay setting Step 1 Setup DHCP Relay SYSTEM TOOLS gt Admin Settings gt DHCP Relay Check the Enable DHCP Relay Enter the IP Generali DDNS DM Relay Password Time Date Timeout Services Interface address of your DHCP server Check the relay domain of DFL 1500 that needs to be relayed gt Namely check the one where the DHCP server o resides and the one where DHCP clients are located Click the App1 y button Apply Reset FIELD DESCRIPTION EXAMPLE When the host of the LAN DMZ in the DFL 1500 internal network sends a DHCP request DFL 1500 will forward it automatically to the specified DHCP server different subnet from the network segment of the DHCP client Enable DHCP Relay Enabled 21 D Link Par
115. s Sessions rule Basic DMZ1 number 1 means that when matching the condition requests of LAN DMZ to WAN direction with its source IP Packets are top down matched by the rules falling in the range of 10 1 1 254 EMM TT O 255 255 255 0 the request will be translated Active Name Direction Source IP Address Translate Src IP into Type l Y Basic DMZ1 LAN DMZ to WAN 10 1 1 254 255 255 255 0 Auto device WAN IP M 1 into a public source IP requests and then be Peer a A Mi El Na Y Basic LAN2 LAN DMZ to WAN 192 168 2 254 255 255 255 0 Auto device WAN IP M 1 forwarded to the destinations ate Mn OUER Basic LANI LAN DMZ to WAN 192 168 1 254 255 255 255 0 Auto device WAN IP M 1 NAT gt Edit Rules Page 1 1 Step 6 Setup IP for the FTP Server Assign an IP of 10 1 1 5 255 255 255 0 to the FTP server under DMZ1 Assume the FTP Server is at 10 1 1 5 And it is listening on the well known port 21 11 D Link Step 7 Setup Server Rules Insert a virtual server rule by clicking the Insert button Step 8 Customize the Rule Customize the rule name as the ftpServer For any packets with its destination IP address equaling to the WAN1 IP 61 2 1 1 and destination port equaling to 44444 DFL 1500 will translate the packets destination IP port into 10 1 1 5 21 Check the Passive FTP client to maximize the compatibility of the FTP protocol This is useful if you want to p
116. s that the key is transient The key is thrown away and replaced by a brand new key using a new Diffie Hellman exchange for each new IPSec SA setup With PFS enabled if one key 1s compromised previous and subsequent keys are not compromised because subsequent keys are not derived from previous keys The time consuming Diffie Hellman exchange is the trade off for this extra security This may be unnecessary for data that does not require such security so PFS is disabled None by default in the DFL 1500 Disabling PFS means new authentication and encryption keys are derived from the same root secret which may have security implications in the long run but allows faster SA setup by bypassing the Diffie Hellman key exchange 9 1 6 Encapsulation gt Transport Mode Transport mode is used to protect upper layer protocols and only affects the data in the IP packets In Transport mode the IP packets contains the security protocol AH or ESP located after the original IP header and options but before any upper layer protocols contains in the packet such as TCP and UDP With ESP protection is applied only to the upper layer protocols contained in the packet The IP header information and options are not used in the authentication process Therefore the originating IP address cannot be verified for integrity against the data 56 VPN Technical Introduction DFL 1500 User Manual With the use of AH as the security protocol protection is exten
117. sense 115 18 4 SIEB Der ee a ee e een Re 115 Chapter 19 106 SM ie 117 19 1 Demand a a les es lo 117 19 2 ON 117 19 3 A A II nle li ii 117 19 4 RR LR 117 19 4 1 System EOS Sea a ee ee ee ee ee ee 117 19 4 2 USOS Mail los ER ASS 118 Chapter 20 System Maintenance ee 119 20 1 POST ass E E A II A el S ERA E RE T E 119 20 2 Steps tor TEEPU perde en iaa 119 20 3 steps tor Firmware Up erage from Web BUT A a BE u 121 20 4 STEPS IOF Facloty RES iaa decreci 121 20 4 1 Steps for NORMA Ts Tact ryresel ii 121 20 4 2 Steps for EMERGENT facl ryreset ee Ra 121 20 5 steps Tor Backtip Restore CONSUL all on re ee een selektieren 122 Appendix A Command Line Intertace CMa er a Eee 123 A l Enable the port of DEE TS Wiese ie aan enden 123 A 2 CErcommands Us RER 123 Appendix B Trouble SOON nina id ae 125 Appendix Packet Flow in ici ae ee nein 129 Append x D Glossary Ol Termica dt ee ea ee au ea 131 Appendix E Md eure bd 133 Appendix Sar Wy Ale eich editor is eek ale ade 135 Appendix G VerslonofSoftwareandfirmware rr 137 Appendix A Customer SUPPoll er an a ae ee ua li 139 IV D Lin Part I Basic Configuration Quick Start DFL 1500 User Manual Chapter 1 Quick Start This chapter introduces how to quick setup the DFL 1500 DFL 1500 is an integrated all in one solution that can facilitate the maximum security and the best resource utilization for the enterprises It cont
118. st from the preconfigured port LANI DMZ 1 to the real DHCP server 210 176 25 3 22 System Tools DFL 1500 User Manual DMZ 1 10 1 1 1 253 WANT IP 61 2 1 1 ES ISP Internet 210 176 25 3 DHCP Server 192 1684071 253 Figure 4 3 DHCP Relay mechanism chart 5 We can adjust the DFL 1500 interface in the SYSTEM TOOLS gt Admin Settings gt Interface in according to our preference and requirement 3 WAN 1 LAN 1 DMZ As the following Figure 4 4 demonstrated there are three ISP connected onto DFL 1500 So we must adjust the interface up to 3 WAN ports to fit the current condition Internet Figure 4 4 Adjust DFL 1500 interface to fit present situation 6 As the following Figure 4 5 demonstrated there is an embedded snmp agent in the DFL 1500 So you can use SNMP manager to monitor the DFL 1500 system status network status etc from either LAN or internet 23 D Link Part I There is an embedded SNMP agent in the DFL 1500 Figure 4 5 It is efficient to use SNMP Manager to monitor DFL 1500 device 4 4 Steps 4 4 1 General settings Step 1 General Setup SYSTEM TOOLS gt Admin Settings gt General Enter the Host Name aS DFL 1 Domain Name Password Time Date Timeout Services Interface as the domain name of your company Click Apply Any Reset FIELD DESCRIPTION EXAMPLE Host Name The host name of the DFL 1500 device DFL 1 Domain Name Fill in the domain name of compa
119. subnets 3 Full Feature The DFL 1500 can be manually configured with Many to One and Many to Many One to One and bidirectional One to One rules to do policy based NAT Total Configured Rules 3 Vacant Rules 197 ADVANCED SETTINGS gt NAT gt NAT Rules NAT Sessions Virtual Servers Server NAT Rules Sessions Status NAT gt Edit Rules Packets are top down matched by the rules Active Name Direction Source IP Address 1 Basic DMZ1 LAN DMZ to WAN 10 1 1 254 255 255 255 0 Basic LAN2 LAN DMZ to WAN 192 169 2 254 255 255 255 0 Basic LANI LAN DMZ to WAN 192 165 40 254 255 255 255 0 Translate Src IP into Type Auto device WAN IP M 1 Auto device WAN IP M 1 Auto device WAN IP M 1 Page 1 1 4 D Link Part II Step 7 Setup Server Rules ADVANCED SETTINGS gt NAT gt Virtual Servers Insert a virtual server rule by clicking the Insert Status NAT Rules NAT Eon Y Sessions essions Item Status Condition Action Active Name Direction Dest IP Address Translate dest IP portinto EZRA Step 8 Customize the Rule ADVANCED SETTINGS gt NAT gt Virtual Servers gt Insert Customize the rule name as the ftpServer For Status NAT Rules lt M Server essions Sessions any packets with its destination IP equaling to the WAN1 IP 61 2 1 1 and destination port equaling to 44444 ask DFL 1500 to translate the packets destination IP port into 10 1 1 5 21 Status Check the Pass
120. t I DHCP Server Current location of the DHCP server Relay Domain The locations of the DHCP clients Table 4 8 System Tools DHCP Relay menu 4 4 5 Change DFL 1500 interface Step 1 Change Interface definition SYSTEM TOOLS gt Admin Settings gt Interface The default port settings are 2 WAN ports 1 DMZ Seneral DDNS DNS Proxy DHCP Relay Password Time Date Timeout Services _ port and 2 LAN ports But in order to fit our requirement Here we select 1 LAN port1 1 Note After interface modified system will be rebooted automatically All DMZ po rt2 and 3 WAN po rt3 5 And then configuration information will be e ed and return the system to its facto press apply button to reboot DFL 1500 Note that the DMZ and LAN port IP addresses are going to be 10 1 1 254 and 192 168 1 254 after device finishes reboot Besides there should be at least one WAN port and one LAN port existing in the DFL 1500 You are not allowed to casually change the interface to the state which has no LAN port or WAN port FIELD DESCRIPTION EXAMPLE You can specify WAN LAN DMZ for each port by your preference Portl Port5 However there must be one WAN and one LAN interface existing n the WAN LAN DMZ DFI 1500 Table 4 9 Change the DFL 1500 interface setting 4 4 6 SNMP Control Step 1 Setup SNMP Control SYSTEM TOOLS gt SNMP Control Through setting the related information in this page we can use SNMP manage
121. t backpressure at Half Duplex operation Support Auto MDI MDI X IEEE 802 3x Flow Control support for Full Duplex mode 1 port for connecting to server RJ 45 connector IEEE 802 3 compliance IEEE 802 3u compliance LAN port DMZ port Support Half Full Duplex operations Support backpressure at Half Duplex operation Support Auto MDI MDI X IEEE 802 3x Flow Control support for Full Duplex mode 1 1 3 4 Console port bB 9 male connector Asynchronous serial DTE with full modem controls N ak N N 135 D Link Part VII 1 1 3 5 LED indication Per Device 1 Power Off Power Off Solid Green Power On Ethernet 10 100M Per ports 1 Link ACT LED Off No Link Solid Green Link Blinking Green Activity 21 Powersupply AT PS AC 90 230 V full range 45 63 Hz Power dissipation 180 W 3 Environmental Specifications 81 Operating Temperature 0 60 C 82 Storage Temperature 25 70 C 3 3 Operating Humidity 5 95 non condensing 4 EMC amp Safety Certification EMC Approval Safety Approval FCC class A VCCI class A CE class A C Tick class A 136 Version of Software and Firmware DFL 1500 User Manual Appendix G Version of Software and Firmware DFL 1500 VPN Firewall Router Version of Components Firmware v 1 5IR 137 Customer Support D Link Offices DFL 1500 User Manual Appendix H Customer Support Australia Brazil Canada Chile China De
122. t to add edit delete the service record just click the below button to add edit delete it e 6 6 666660 O mw mo TR Table 4 5 Setup the service name record 4 4 2 DDNS setting Step 1 Setup DDNS SYSTEM TOOLS gt Admin Settings gt DDNS If the IP address of DFL 1500 WAN port is ES Password Time Date Timeout Services Interface dynamic allocated You may want to have the Dynamic DNS mechanism to make your partner always use the same domain name like xxx com m to connect to you Select a WAN interface to AAN update the DDNS record Here we supply two DDNS Service Providers Fill in the Host Name Username Password supplied by the DDNS web site Please refer to the DDNS web site for the detail information Click Apply to activate the settings abc corn MT elem 26 System Tools DFL 1500 User Manual FIELD DESCRIPTION EXAMPLE Enable DDNS for WANI Enable DDNS feature of DFL 1500 Enabled Interface Ass gn which public IP address of interface to the DDNS server WANI The domain address of DDNS server In the DFL 1500 we provide SEIEN WWW DYNDNS ORG and WWW DHS ORG two websites for choice WWW DEN ORG Hostname The registered Hostname in the DDNS server Username The registered username in the DDNS server Password The registered password in the DDNS server 1234567 Table 4 6 System Tools DDNS setting page 4 4 3 DNS Proxy setting Step 1 Setup DNS Proxy SYSTEM TOOLS gt Admin Setting
123. te ADVANCED SETTINGS gt VPN Settings gt IPSec gt IKE Pass IPSec Through ViEnable IPSec Apply IKE Manual Key Edit Modify IPSec Security Associations Active Name Local LAN Remote LAN Mechanism My IP C Edit Delete ADVANCED SETTINGS gt VPN Settings gt IPSec gt IKE gt Add IPSec PPTP L2TP Security Gateway IPSec gt IKE gt Edit Rule E Status v Active IKE Rule Name IKErule Condition Local Address Type Subnet Address IP Address 192 168 88 0 PrefixLen Subnet Mask 255 255 255 0 Remote Address Type Subnet Address Y IP Address 192 168 40 0 PrefixLen Subnet Mask 255 255 255 0 Negotiation Mode Main Encapsulation Mode Tunnel My IP Address 202713 Security Gateway Addr 61 2 1 1 ESP Algorithm Encrypt and Authenticate DES MD5 OAH Algorithm Pre Shared Key 1234567890 Advanced Back Apply 65 D Link Step 4 Remind to add a Firewall rule After finishing IPSec rule settings we need to add a firewall rule Here system shows a window message to remind you of adding a firewall rule Just press the OK button to add a firewall rule Step 5 Add a Firewall rule Same as at DFL 1 We need to add an extra firewall rule to allow IPSec packets to come from internet So here we select WANI to LANI direction and click Insert button Step 6 Customize the Firewall rule Check the Activate this rule Enter the Rule Name as
124. tering FTP Filtering DFL 1500 User Manual Chapter 15 Content Filtering FTP Filtering This chapter introduces FTP proxies and explains how to implement it 15 1 Demands 1 Some users in LANI use FTP to download big MP3 files and cause waste of bandwidth 15 2 Objectives 1 Forbid PC1_1 from downloading MP3 files with FTP 15 3 Methods 1 Setup the filename extension of the forbidden types of file that are not allowed to be transmitted using standard FTP port 2 Let PC1_1 download a MP3 file from the FTPServer3 to see if the session is blocked switch A Internet zZ A F Pe LAN1_IP WANT P i 192 168 40 254 61 2 1 1 switc BE nm gt PARAS www nthu edu tw www nctu edu tw PC1_1 PC1 2 19 168 40 192 168 402 140 114 x x 140 1 KER LAN 1 99 168 40 1 253 BE 22 168 0 2 WebServer3 MailServer3 FTPServer3 140 112 4 4 140 112 1 3 14011215 Figure 15 1 Use FTP filter functionality to avoid user download forbidden file type 97 D Link Part IV 15 4 Steps Step 1 Enable FTP Filter ADVANCED SETTINGS gt Content Filters gt FTP Filter gt FTP Check the Enable FTP Filter checkbox and Web Filter Mail Filter click the nearby Apply button to enable this feature Click the Add button to add a new FTP filter DESCRIPTION EXAMPLE Enable FTP Filter Enable FTP Filter feature of DFL 1500 Table 15 1 FTP Filter FTP setting page Step 2 Add an FTP
125. ternal network suppose your company uses DSL to connect Internet via PPPoE By this way you should setup WAN port of the DFL 1500 in advance There are some adjustment within your company so the original network stucture has been changed Now you should modify the configuration between the internal network DMZ LAN Your company needs more network bandwidth if 1t is insufficent for your company to connect to the external network Objectives Configure the network settings of the DFL 1500 WANI port Configure the network settings of the DFL 1500 DMZI and LANI ports Suppose your company applys another ISP and hope that the applied Network IP can configure in the same WAN port of DFL 1500 Methods Select the PPPoE method in the DFL 1500 Basic Setup WAN settings WANI IP and then configure the related account and password in order to connet to the internet Configure the related network settings in the pages of the DFL 1500 Basic Setup DMZ settings DMZ1 Status Basic Setup LAN settings LAN Status Configure the IP alias in WANI port Steps Notice Do not try to configure the port network setting from the same port you login Or the network will be terminated and system will be locked in the original IP address 15 D Link Part I 3 4 1 Setup WAN1 IP Step 1 Setup WANT port BASIC SETUP gt WAN Settings gt WAN1 IP gt Fixed IP Address Here we select Fixed IP Address method in WAN2 IP IP Alias WAN1 port F
126. the Local Address Type As Figure and Figure indicated when we configure an IPSec policy please be sure to add a rule to let the packets of the IPSec pass from WAN to LAN For the setting of the IP address please refer to the Figure 125 D Link Part VII IPSec PPTP L2TP IP Sec gt IKE gt Edit Rule Status Active KE Rule Name IKErule Condition Local Address Type pubnet Address dd e ve e IP Address 192 168 40 0 ie Te RrefigLen Subnet Mask 255 255 255 0 1 ALTE L ee Cocccceceneeeeee Remote Address Type Subnet Address mn zum EE IP Address 1192 168 30 0 Mw refixLen Subnet Mask 255 255 255 0 ED a qua Figure B 1 Inset a new IPSec policy Status Adit Rules Show Rules Attack Alert Summary Firewall gt Bdit Rules gt Insert Insert a new Firewall rule SS Activate this rule Rule name AllowiPSecPkt Source IP 192 168 30 0 Netmask 255 255 255 0 00000000000 e gt Dest IP 192 168 40 0 Netmask 255 255 255 0 Service Any Y Configure dest port Type Single Range Dest Port of Jhe matched packet Dont log the matched packet Back Apply Reset Figure B 2 Insert a new firewall rule in WAN to LAN 7 When l try to login into the DFL 1500 t showed up the following information as the Figure indicated and couldn t login successfully
127. the TFTP server T ftpServer exe in the c directory and double click to run it Place all bin files in the c as well Set the PC to be 192 168 1 x to be in the same subnet with the DFL 1500 s LAN1 Login to DFL 1500 s console Enter en to enter privileged mode Configure the LAN1 address so that the DFL 1500 can connect to the TFTP server The CLI command to configure LAN1 interface is ip ifconfig INTF3 1925168412252 255 7255 25520 Step 2 Upgrade firmware Enter IP tftp upgrade combo 192 168 1 x lt date gt DFL 1500 lt ver gt bin Notice if you want to preserve the add the preserve keyword to the end previous configuration Step 3 Reboot the system Enter sys reboot now to instantly reboot the system Step 4 Check if OK Part VI NetOS i386 DFL 1500 tty00 admin Password Welcome to DFL 1500 Firewall VPN Router login DFL 1500 gt en DFL 1500 ip ifconfig INTF3 192 168 1 254 255 255 255 0 DFL 1500 DFL 1500 ip tftp upgrade combo 192 168 1 2 20030910 DFL 1500 1 50R bin Fetching from 192 168 1 2 for 20030910 DFL 1500 1 50R bin tftp gt tftp gt Verbose mode on tftp gt getting from 192 168 1 2 20030910 DFL 1500 1 50R bin to 20030910 DFL 1500 1 50R bin octet DFL 1500 sys reboot now Rebooting syncing disks done rebooting ASIC IPSec Enabled Ethernet address 00 80 c8 50 fa Ethernet address 00 80 c8 50 fa Ethernet address 00 80 c8 50 fa bc Ethernet address 00 80 c
128. the local LAN subnet Remote Address means the remote LAN subnet My IP Address means the WAN IP address of the local VPN gateway while the Security Gateway Address means the WAN IP address of the other VPN gateway 59 D Link Part III Difference The Pre Shared Key must be the same at both The types and keys of Encryption and Authenticate DFL 1500s must be set the same on both DFL 1500s However the Outgoing SPI at DFL 1 must equal to Incoming SPI at DFL 2 and the Outgoing SPI at DFL 2 must equal to Incoming SPI at DFL 1 Table 10 1 Compared IKE and Manual Key methods 10 4 Steps In the following we will separately explain the ways to set up a secure DES MDS tunnel with IKE and Manual key gt DES MDS5 IPSec tunnel the IKE way At DFL 1 At the first we will install the IPSec properties of DFL 1 Step 1 Enable IPSec ADVANCED SETTINGS gt VPN Settings gt IPSec Check the Enable IPSec checkbox and click Apply Item Status Condition Action Active Name LocallAN RemoteLAN Mechanism MyIP Security Gateway Step 2 Add an IKE rule Click the IKE hyperlink and click Add to add a Pass Through Item Status Condition Action a a ar gt gt new IPSec VPN tunnel endpoint 60 Virtual Private Network IPSec Step 3 Customize the rule Check the Active checkbox Enter a name for this rule like IKErule Enter the Local IP
129. topology for deploying DFL 1500 2 2 Changing the LAN1 IP Address The default settings of DFL 1500 are listing in Table 1 1 However the original LAN setting is 192 168 1 254 255 255 255 0 instead of 192 168 40 254 255 255 255 0 as in Figure 2 1 We will change the LANI IP of the DFL 1500 to 192 168 40 254 Notice that you cannot change the LAN1 IP from the LANI interface because your configuration session to LAN1 will be terminated as long as the LANI IP address is changed If you do change the IP from the LANI port you will have to reboot the system change your computer s IP to the new subnet and reconnect to the new LANI IP address You can also use console to login into the system 13 D Link Part I and then logout the system That will clean up the zombie left in the system so you will be able to login to the DFL 1500 from the LANI side after your computer s IP is changed into the new subnet We provide two normal ways to configure the LANI IP address One is to configure the LANI IP from another port such as DMZ1 or LAN2 The other is to configure the LANI IP through console Note that when setting the IP address from console the settings are updated into run time system but not stored into the flash Namely the settings will be lost after you reboot the system So it is best to use the first method for setting the LANI IP address 2 2 1 From DMZ1 to configure DFL 1500 LAN1 network settings Step 1 Check NAT Status Use an IE 6
130. twork Status Status Rech 116 Part VII Log System DFL 1500 User Manual Chapter 19 Log System 19 1 Demands 1 The System Administrator wants to know all the actions of administration in the past So it can avoid illegal system administration 2 The System Administrator needs to check the logs of VPN IDS Firewall and Content Filter everyday But he she feels inconvient to verify the DFL 1500 logs He She hopes to decrease the checking procedure 19 2 Objectives l The System Administrator wants to know all actions of administration in the past 2 The System administrator would like to view the daily log report of DFL 1500 19 3 Methods l Through tracking the system logs you can distinguish which administrated action is valid or not 2 Use the syslog server to receive mail Or edit the Mail Logs page of DFL 1500 Make the log mailed out automatically every periodic time 19 4 Steps 19 4 1 System Logs Step 1 View System Logs DEVICE STATUS gt System Logs Setup Syslog Server by checking the Enable System Access Logs Syslog Server It will let DFL 1500 send logs No Time Source IP Access Info ifi i s 1 2003 12 31 09 37 54 DFL 1500 SYSTEM 51 Wall Startup to the Syslog Server specified in the Syslog 2003 12 31 09 37 55 DFL 1500 Firewall Reload all rules at startup Server IP Address field 2003 12 31 09 37 55 DFL 1500 NAT rule for Basic LAN2 added 2003 12 31 09 37 55 DFL 150
131. uces firewall and explains how to implement it 8 1 Demands 1 Administrators detect that PC1_1 in LAN_1 is doing something that may hurt our company and should instantly block his traffic towards the Internet 2 A DMZ server was attacked by SYN Flooding attack and requires the DFL 1500 to protect it 8 2 Objectives 1 Block the traffic from PC1_1 in LANI to the Internet in WANI 2 Start the SYN Flooding protection Organization_1 Private LANs DMZ_1 10 1 1 1 253 User define Which LAN to WAN traffic should block O e g PCI _ u User define Which kiii WAN to LAN traffic should forward G eero Default Forward all 192 168 40 1 192 168 40 2 LAN to WAN traffic LAN_1 92 168 40 1 25 Default Block all WAN to LAN traffic Figure 8 1 Setting up the firewall rule 8 3 Methods 1 AddaLANI to WANI Firewall rule to block PCI 2 Start the SYN Flooding protection by detecting statistical half open TCP connections 49 D Link 8 4 Steps Part Il 8 4 1 Block internal PC session LAN gt WAN Step 1 Setup NAT Check the Enable Stateful Inspection Firewall checkbox and click the Apply Step 2 Add a Firewall Rule Select LAN1 to WANT traffic direction The default action of this direction is to forward all traffic without logging anything Click Insert to add a Firewall block rule before the default rule to stop the bad traffic Step 3 Customize the rule Check the A
132. uired to accommodate new connection attempts This 1s the number of existing half open sessions that causes the firewall to start deleting half open sessions When the number of Maximum Incomplete High existing half open sessions rises above this number the 100 DFL 1500 deletes half open sessions as required to accommodate new connection requests This 1s the number of existing half open TCP sessions with the same destination host IP address that causes the firewall to start dropping half open sessions to that same destination host IP address Enter a number between 1 and 250 As a general rule you should choose a smaller number for a smaller network a slower system or limited bandwidth When TCP Maximum Incomplete is reached you can choose if the next session should be allowed or blocked If you check Blocking Time any new sessions will be blocked for the length Blocking Time of time you specified in the next field min and all old disabled incomplete sessions will be cleared during this period If you want strong security it s better to block the traffic for a short time as will give the server some time to digest the loading Enter the length of Blocking Time in minutes Table 8 2 Setup the Denial of Service Thresholds of attack alert TCP Maximum Incomplete 52 Part Ill Virtual Private Network VPN Technical Introduction DFL 1500 User Manual Chapter 9 VPN Technical Introduction This chapter introduces VPN relate
133. ule Here system shows a window message to remind you of adding a firewall rule Just press the OK button to add a firewall rule Step 6 Add a Firewall rule Same as that in IKE method Please make sure that the Firewall is enabled Select WAN1 to LAN1 to display the rules of this direction The default action of this direction is Block with Logs We have to allow the VPN traffic from the WAN1 side to enter our LAN1 side So we click the Insert button to add a Firewall rule before the default rule Step 7 Customize the Firewall rule Check the Activate this rule Enter the Rule Name as AllowVPNIKErule Source IP as 192 168 88 0 and Dest IP 3 192 168 40 0 Click Apply to store this rule Part Ill ADVANCED SETTINGS gt VPN Settings gt IPSec gt Manual Key gt Add IPSec PPTP L2TP 1 If you enable the firewall please check whether these firewall rules would block packets in tunnel 2 Packets are blocked by default in the WAN to LAN direction please add a rule to forward these tunneled packets 3 The source address mask and the destination address mask of the firewall rules are 192 168 88 0 255 255 255 0 and 192 168 40 0 255 255 255 0 respectively oK ADVANCED SETTINGS gt Firewall gt Edit Rules Status Edit Rules Show Rules Attack Alert Summary Edit WANT Y to LAN Y rules Deffweiisnfocihisnacksieireeffon Block v Y Log eply Packets are top down matched by the rules item Status a U Action
134. usly and can not be edited Active Protocol Be y p y ESP Encrypt and Encryption Algorithm Choose an encryption and authentication algorithm Authenticate DES MD5 Set the IPSec SA lifetime A value of O means IKE SA SA Life Time negotiation never times out See Chapter 9 for details 28800 sec Perfect Forward Enabling PFS means that the key is transient This extra DHI Secrecy PFS setting will cause more security Table 10 3 Setup Advanced feature in the IPSec IKE rule Step5 Remind to add a Firewall rule ADVANCED SETT NGS gt VPN Settings gt IPSec gt IKE gt Add After finishing IPSec rule settings we need to add a firewall rule Here system shows a window message to remind you of adding a firewall rule Just press the OK button to add a firewall rule 63 D Link Step 6 Add a Firewall rule Beforehand please make sure that the Firewall is enabled Select WAN1 to LAN1 to display the rules of this direction The default action of this direction is Block with Logs We have to allow the VPN traffic from the WAN1 side to enter our LAN1 side So we click the Insert button to add a Firewall rule before the default rule Step 7 Customize the Firewall rule Check the Activate this rule Enter the Rule Name aS AllowVPNIKErule Source IP as 192 168 88 0 and Dest IP as 192 168 40 0 Click Apply to store this rule Step 8 View the result Here we have a new rule before the default firewall
135. will be allowed to pass through the DFL 1500 and successfully access the 192 168 88 0 24 through the VPN tunnel DFL 1500 User Manual ADVANCED SETTINGS gt Firewall gt Edit Rules Status Edit Rules Show Rules Attack Alert Summary Firey Edit WANT Y to LAN v rules Dalia ihis en Block O WlLog Apply Packets are top down matched by the rules item Status TIO Action Active Name Direction Source IP Address Dest IP Address Service Action Log 1 y Default Oo WANT to LAN1 Any Any Any Block Y ADVANCED SETTINGS gt Firewall gt Edit Rules gt Insert Edit Rules Show Rules Attack Alert Page 1 1 Status Summary Firewall gt Edit Rules gt Insert Insert a new WAN1 to WAN1 Firewall rule Activate this rule Rule name Allow yPNIKE rule Condition Source IP 192 168 40 0 Dest IP 192 168 858 0 Netmask 255 255 255 0 Netmask 255 255 255 0 Service Any Y Configure dest port Type Single Dest Port to FTP 21 Y Forward the matched packet Dont log the matched packet ADVANCED SETTINGS gt Firewall gt Edit Rules Edit Rules Show Rules Attack Alert Range Copy To Dist Status Summary Firewall gt Edit Rules Edit WANT Y to LAN Y rules Default action for this packet direction Block v v Log 4eply Packets are top down matched by the rules Item Status AA UTA Active Name Direction Source IP Address Dest IP Address Service Action Log WANT to LAN1 WAN to
136. y applications DHCP Relay It is to solve the problem that when the DHCP client is not in the same domain with the DHCP server the DHCP broadcast will not be received by the server If the client is in the LAN 192 168 40 X while the server is located in the DMZ 10 1 1 10 the server will not receive any broadcast packet from the client Suppose our company applies three ISPs but there are just two default WAN ports in the DFL 1500 You hope to connect the whole ISP links to the DFL 1500 The System Administrator would like to monitor the device from remote side efficiently Objectives Configure the general properties such as domain name password system time and connection timeout correctly Besides we can configure the prefered service name as the service name numeric mapping list DDNS By using the DDNS Dynamic DNS the DFL 1500 will send the request for modification of the corresponding DNS record to the DDNS server after the IP s changed DNS Proxy Reduce the number of DNS requests and the time for DNS lookup DHCP Relay Enable the DHCP client to contact with the DHCP server located in different domain and get the required IP We hope to customize the interface of DFL 1500 to fit our requests Through the SNMP manager we can easily monitor the device status Methods Configure the domain name password system time connection timeout and service name DDNS Configure the DFL 1500 so that whenever the IP of the DFL 1

Download Pdf Manuals

image

Related Search

Related Contents

1. - cimmyt  1.20 CYLINDER LINER  sunny sf-t1413 treadmill user manual  Thruster systems - Marlow  Sanyo STW0623C2 User's Manual  ROBO Master Pro取扱説明書  Manuel de Reparation de L`Emetteur Recepteur  

Copyright © All rights reserved.
Failed to retrieve file