D-Link DFL-2560G Network Security UTM Firewall manuels

Manuels d'utilisation et guides de l'utilisateur pour Pare-feu matériel D-Link DFL-2560G Network Security UTM Firewall.
Nous fournissons des manuels en pdf 1 D-Link DFL-2560G Network Security UTM Firewall à télécharger gratuitement par type de document : Manuel d'utilisateur


Table des matières

User Manual

1

Table of Contents

4

List of Figures

9

List of Examples

10

Example 1. Example Notation

12

1.1. Features

14

NetDefendOS Documentation

16

1.2. NetDefendOS Architecture

17

1.2.3. Basic Packet Flow

18

Note: Additional actions

19

Apply Rules

23

2.1. Managing NetDefendOS

25

Note: Recommended browsers

26

Setting the Workstation IP

27

Multi-language Support

28

The Web Browser Interface

28

Interface Layout

29

2.1.4. The CLI

30

Note: Category and Context

31

Tip: Getting help about help

31

Tab Completion

32

Tab Completion of Data

32

Object Categories

32

Selecting Object Categories

33

Inserting into Rule Lists

33

Referencing by Name

33

Using Unique Names

34

Using Hostnames in the CLI

34

Serial Console CLI Access

34

SSH (Secure Shell) CLI Access

35

Logging on to the CLI

35

Changing the CLI Prompt

36

Logging off from the CLI

37

2.1.5. CLI Scripts

38

Script Variables

39

Error Handling

39

Script Output

39

Saving Scripts

39

Listing Scripts

40

2.1.6. Secure Copy

41

NetDefendOS File organization

42

2.1.7. The Console Boot Menu

43

HTTPS Certificate

46

Configuration Objects

46

Object Types

46

Object Organization

46

Listing Modified Objects

49

2.2. Events and Logging

51

2.2.3.1. Logging to Memlog

52

The Prio and Severity fields

53

Note: SNMP Trap standards

54

Send Limit

55

Alarm Repetition Interval

55

2.3. RADIUS Accounting

56

STOP Message Parameters

57

2.3.9. Limitations with NAT

59

Logout at shutdown

60

Maximum Radius Contexts

60

2.4. Hardware Monitoring

61

2.5. SNMP Monitoring

63

2.5.1. SNMP Advanced Settings

64

2.6. The pcapdump Command

66

Filter Expressions

67

Downloading the Output File

67

Combining Filters

68

Compatibility with Wireshark

68

2.7. Maintenance

69

PROCESS

71

Chapter 3. Fundamentals

73

3.1.3. Ethernet Addresses

75

3.1.4. Address Groups

76

3.1.6. Address Book Folders

77

3.2. Services

78

Streaming Applications

79

Specifying Port Numbers

79

Tip: Source port values

80

3.2.3. ICMP Services

81

Tip: IP protocol numbers

82

3.2.5. Service Groups

83

3.3. Interfaces

84

3.3.2. Ethernet Interfaces

85

Note: Additional switch ports

86

Note: Interface enumeration

86

Example 3.10. Enabling DHCP

87

Web Interface

88

4. Click OK

88

3.3.3. VLAN

90

License Limitations

91

Example 3.11. Defining a VLAN

92

3.3.4. PPPoE

93

User authentication

94

Dial-on-demand

94

Unnumbered PPPoE

94

3.3.5. GRE Tunnels

95

GRE and the IP Rule Set

96

An Example GRE Scenario

96

3.3.6. Interface Groups

98

3.4. ARP

99

Flushing the ARP Cache

100

Size of the ARP Cache

100

Static ARP Entries

101

Published ARP Entries

101

Changes to the ARP Cache

102

Multicast and Broadcast

102

Unsolicited ARP Replies

102

ARP Requests

102

ARP cache size

105

ARP Hash Size

105

ARP Hash Size VLAN

105

ARP IP Collision

105

3.5. The IP Rule Set

106

3.5.2. IP Rule Evaluation

108

3.5.3. IP Rule Actions

109

3.5.5. IP Rule Set Folders

110

3.6. Schedules

112

3.7. Certificates

114

Important

115

3.8. Date and Time

118

Example 3.23. Enabling DST

119

Configuring Time Servers

120

Maximum Time Adjustment

121

Synchronization Intervals

122

D-Link Time Servers

122

Time Zone

122

Group interval

124

3.9. DNS

125

Dynamic DNS

126

Chapter 4. Routing

128

4.2. Static Routing

129

A Typical Routing Scenario

130

4.2.2. Static Routing

133

Displaying the Routing Table

134

The all-nets Route

135

Core Routes

136

4.2.3. Route Failover

137

Setting the Route Metric

138

Multiple Failover Routes

138

Failover Processing

138

Re-enabling Routes

138

Route Interface Grouping

139

Gratuitous ARP Generation

139

Overview

139

Enabling Host Monitoring

140

Specifying Hosts

140

4.2.5. Proxy ARP

141

A Typical Scenario

142

4.3. Policy-based Routing

143

4.3.4. PBR Table Selection

144

4.3.5. The Ordering parameter

144

4.4. Route Load Balancing

148

RLB Resets

151

RLB Limitations

151

An RLB Scenario

151

Example 4.6. Setting Up RLB

152

RLB with VPN

153

4.5. Dynamic Routing

154

4.5.2. OSPF

155

Link-state Routing

156

OSPF Areas

156

Components of OSPF

156

The Designated Router

156

Neighbors

157

Aggregates

157

Virtual Links

157

A Partitioned Backbone

158

4.5.3. Dynamic Routing Policy

159

4.6. Multicast Routing

162

4.6.3. IGMP Configuration

166

Figure 4.10. Multicast Snoop

167

Figure 4.11. Multicast Proxy

167

Advanced IGMP Settings

171

4.7. Transparent Mode

174

How Transparent Mode Works

175

Enabling Transparent Mode

176

Transparent Mode with VLANs

177

Transparent Mode with DHCP

178

Grouping IP Addresses

179

Using NAT

179

Scenario 1

180

Scenario 2

181

Implementing BPDU Relaying

184

CAM To L3 Cache Dest Learning

184

Note: Optimal ATS handling

185

Null Enet Sender

186

Broadcast Enet Sender

186

Multicast Enet Sender

186

Relay Spanning-tree BPDUs

186

Relay MPLS

187

4.7.5. Advanced Settings for

188

Transparent Mode

188

Chapter 5. DHCP Services

189

5.2. DHCP Servers

190

5.3. Static DHCP Assignment

193

Auto Save Policy

194

Lease Store Interval

194

5.4. DHCP Relaying

195

Max Transactions

196

Transaction Timeout

196

Max Hops

196

Max lease Time

196

Max Auto Routes

197

Auto Save Interval

197

5.5. IP Pools

198

Using Prefetched Leases

199

6.1. Access Rules

201

Note: Enabling logging

202

6.2. ALGs

204

6.2.2. The HTTP ALG

205

6.2.3. The FTP ALG

208

The Solution

209

Filetype Checking

209

Anti-Virus Scanning

210

FTP ALG with ZoneDefense

210

6.2.4. The TFTP ALG

214

6.2.5. The SMTP ALG

215

Enhanced SMTP and Extensions

217

6.2.5.1. DNSBL SPAM Filtering

218

Tagging SPAM

220

Adding X-SPAM Information

221

Verifying the Sender Email

221

Setup Summary

222

The dnsbl CLI Command

222

Tip: DNSBL servers

223

6.2.6. The POP3 ALG

224

6.2.7. The SIP ALG

224

SIP Components

225

SIP Media-related Protocols

225

NetDefendOS SIP Setup

225

SIP ALG Options

225

IP Rules for Media Data

226

SIP Usage Scenarios

227

Scenario 3

231

6.2.8. The H.323 ALG

234

H.323 Protocols

235

H.323 ALG features

235

H.323 ALG Configuration

236

6.2.9. The TLS ALG

248

Enabling TLS

249

URLs Delivered by Servers

250

NetDefendOS TLS Limitations

250

Note: Enabling WCF

251

Wildcarding

252

6.3.4.1. Overview

254

6.3.4.2. Setting Up WCF

255

Tip: Using a schedule

256

Audit Mode

257

Allowing Override

258

Category 1: Adult Content

259

Category 2: News

260

Category 3: Job Search

260

Category 4: Gambling

260

Category 5: Travel / Tourism

260

Category 6: Shopping

260

Category 7: Entertainment

261

Category 8: Chatrooms

261

Category 9: Dating Sites

261

Category 10: Game Sites

261

Category 11: Investment Sites

261

Category 12: E-Banking

262

Category 15: Politics

262

Category 16: Sports

262

Category 17: www-Email Sites

263

Category 19: Malicious

263

Category 20: Search Sites

263

Category 21: Health Sites

263

Category 28: Drugs/Alcohol

265

Category 29: Computing/IT

265

Category 31: Spam

265

Category 32: Non-Managed

265

Tip: Saving changes

266

HTML Page Parameters

267

6.4. Anti-Virus Scanning

268

6.4.4. The Signature Database

270

6.4.6. Anti-Virus Options

270

3. Compression Ratio Limit

271

Verifying the MIME Type

271

Anti-Virus with ZoneDefense

272

6.5.1. Overview

274

6.5.3. IDP Rules

276

Initial Packet Processing

277

Checking Dropped Packets

277

6.5.5. IDP Pattern Matching

278

6.5.6. IDP Signature Groups

279

Listing of IDP Groups

280

Processing Multiple Actions

280

IDP Signature Wildcarding

280

6.5.7. IDP Actions

281

6.6.1. Overview

285

6.6.2. DoS Attack Mechanisms

285

Boink and Nestea

286

6.6.6. The WinNuke attack

286

6.6.8. TCP SYN Flood Attacks

288

6.6.9. The Jolt2 Attack

288

Blacklisting Options

289

Whitelisting

289

The CLI blacklist Command

290

7.1. NAT

292

Applying NAT Translation

294

Protocols Handled by NAT

295

7.2. NAT Pools

297

Example 7.2. Using NAT Pools

298

Note: Port forwarding

300

Address (1:1)

301

Addresses (M:N)

305

7.3.4. Port Translation

306

7.3.7. SAT and FwdFast Rules

308

8.1. Overview

311

8.2. Authentication Setup

313

8.2.4. External LDAP Servers

314

Server Responses

316

LDAP Authentication and PPP

317

8.2.5. Authentication Rules

318

The XAuth Agent

319

Connection Timeouts

319

Multiple Logins

319

8.2.7. HTTP Authentication

320

Setting Up IP Rules

321

Forcing Users to a Login Page

321

8.3. Customizing HTML Pages

325

Chapter 9. VPN

329

9.1.2. VPN Encryption

330

9.1.3. VPN Planning

330

9.1.4. Key Distribution

331

“The TLS ALG”

332

9.2. VPN Quick Start

333

Interface Network Gateway

335

Configuring IPsec Clients

338

9.2.7. PPTP Roaming Clients

341

9.3. IPsec Components

343

IKE Negotiation

344

IKE and IPsec Lifetimes

344

IKE Algorithm Proposals

344

IKE Parameters

345

Diffie-Hellman Groups

348

9.3.3. IKE Authentication

349

Figure 9.1. The AH protocol

350

9.3.5. NAT Traversal

351

Achieving NAT Detection

352

Changing Ports

352

UDP Encapsulation

352

NAT Traversal Configuration

352

9.3.7. Pre-shared Keys

354

9.3.8. Identification Lists

355

9.4. IPsec Tunnels

357

9.4.3. Roaming Clients

358

9.4.3.4. Using Config Mode

362

IP Validation

363

VPN Tunnel Negotiation

364

Using ikesnoop

364

The Client and the Server

365

Explanation of Values

366

Explanation of Above Values

369

Step 6. Server ID Response

369

IPsec Max Rules

371

IPsec Cert Cache Max Certs

373

IPsec Gateway Name Cache Time

373

DPD Metric

373

DPD Keep Time

373

DPD Expire Time

374

9.5. PPTP/L2TP

375

9.5.2. L2TP Servers

376

L2TP Before Rules

380

PPTP Before Rules

380

9.5.4. PPTP/L2TP Clients

381

Figure 9.3. PPTP Client Usage

382

9.6. CA Server Access

383

CA Server Access by Clients

384

Turning Off FQDN Resolution

385

9.7. VPN Troubleshooting

386

Troubleshooting IPsec Tunnels

387

10.1. Traffic Shaping

390

Traffic Shaping Objectives

391

Pipe Rules

392

Using a Single Pipe

394

Using Two Pipes

394

10.1.6. Precedences

396

The Best Effort Precedence

397

Applying Precedences

397

10.1.7. Guarantees

398

10.1.9. Groups

399

10.1.10. Recommendations

400

10.1.12. More Pipe Examples

402

Using Several Precedences

403

Pipe Chaining

404

A VPN Scenario

404

SAT with Pipes

405

10.2. IDP Traffic Shaping

407

10.2.3. Processing Flow

408

10.2.5. A P2P Scenario

409

Viewing Pipes

410

Pipe Naming

410

Pipes are Shared

410

10.2.8. Logging

411

10.3. Threshold Rules

412

10.3.4. Rule Actions

413

10.3.6. Exempted Connections

413

10.4. Server Load Balancing

414

SLB Algorithm Selection

415

Usage Considerations

415

10.4.6. SLB_SAT Rules

418

Example 10.3. Setting up SLB

419

Chapter 11. High Availability

422

Cluster Management

423

Load-sharing

423

Hardware Duplication

423

Extending Redundancy

423

Licensing

423

11.2. HA Mechanisms

424

Failover Time

425

Shared IP Addresses and ARP

425

HA with Anti-Virus and IDP

425

Dealing with Sync Failure

425

11.3. HA Setup

427

Problem Diagnosis

430

11.4. HA Issues

431

11.5. HA Advanced Settings

432

Chapter 12. ZoneDefense

434

12.2. ZoneDefense Switches

435

12.3. ZoneDefense Operation

436

12.3.5. Limitations

438

Chapter 13. Advanced Settings

441

IP Reserved Flag

444

Strip DontFragment

444

Multicast Mismatch option

444

Min Broadcast TTL option

444

13.2. TCP Level Settings

445

Allow TCP Reopen

449

13.3. ICMP Level Settings

450

13.4. State Settings

451

Log Connection Usage

452

Dynamic Max Connections

452

Max Connections

452

Other Idle Lifetime

454

13.6. Length Limit Settings

455

13.7. Fragmentation Settings

457

Failed Fragment Reassembly

458

Dropped Fragments

458

Duplicate Fragments

458

Fragmented ICMP

459

Minimum Fragment Length

459

Reassembly Timeout

459

Max Reassembly Time Limit

459

Reassembly Done Limit

459

Reassembly Illegal Limit

460

Max Concurrent

461

Max Size

461

Large Buffers

461

13.9. Miscellaneous Settings

462

Introduction

464

Subscription renewal

464

Monitoring database updates

464

Database Console Commands

464

Querying Update Status

465

Querying Server Status

465

Deleting Local Databases

465

Appendix D. The OSI Framework

474

Alphabetical Index

477





Plus de produits et de manuels pour Pare-feu matériel D-Link

Modèles Type de document
DFL-1660 Manuel d'utilisateur   D-Link DFL - 1660 Network Security UTM Firewall, 469 pages
DFL-80 Spécifications   D-Link DFL-80 Specifications, 147 pages
D DFL-500 DFL-500 Manuel d'utilisateur   D-Link D DFL-500 DFL-500 User`s manual [en] , 114 pages
DFL-2560-IPS-12 Manuel d'utilisateur   Untitled - D-Link, 38 pages
DFL-1100 - Security Appliance Manuel d'utilisateur   CLI Manual(1004152444) - D-Link [en] , 19 pages
DFL-160 Manuel d'utilisateur   D-Link Corporation Firewall Specification Version 1.10, 7 pages
DFL-500 Manuel d'utilisateur   D-Link DFL-500 User's Manual, 122 pages
DFL-260E/ANB Fiche technique   D-Link DFL-260E, 6 pages
DFL-160/A Fiche technique   D-Link DFL-160, 4 pages
SSG-520M-SH-N-TAA Fiche technique   Juniper SSG-520M, 12 pages
DFL-2560 Fiche technique   D-Link DFL-2560 firewall (hardware), 7 pages
DFL-1000 Fiche technique   D-Link WORKGROUP FIREWALL 1LAN, 3 pages
DFL- 860 Manuel d'utilisateur   D-Link DFL-260, 355 pages