D-Link DFL- 860 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Hardwarové brány firewall D-Link DFL- 860. D-Link DFL-260 Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 355
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - User Manual

Network Security Solution http://www.dlink.com Security Security DFL-210/ 800/1600/ 2500DFL-260/ 860Ver. 1.07Network Security FirewallUser Manual

Strany 2 - NetDefendOS version 2.20

List of Examples1. Example Notation ...122.1. Enabling SSH R

Strany 3 - Limitations of Liability

interfaces.The first two options can be regarded as combining the alternate table with the main table andassigning one route if there is a match in bo

Strany 4 - Table of Contents

Example 4.5. Policy Based Routing ConfigurationThis example illustrates a multiple ISP scenario which is a common use of Policy-based Routing. The fol

Strany 5

NoteRules in the above example are added for both inbound and outbound connections.4.3.5. The Ordering parameter Chapter 4. Routing102

Strany 6

4.4. Dynamic Routing4.4.1. Dynamic Routing overviewDynamic routing is different to static routing in that the D-Link Firewall will adapt to changes of

Strany 7

Routing metrics are the criteria a routing algorithm uses to compute the "best" route to a destination.A routing protocol relies on one or s

Strany 8

to which they have an interface.ASBRsRouters that exchange routing information with routers in other AutonomousSystems are called Autonomous System Bo

Strany 9 - List of Figures

in the routing table. This is commonly used to minimize the routing table.Virtual LinksVirtual links are used for:• Linking an area that does not have

Strany 10 - List of Examples

common area in between.Figure 4.3. Virtual Links Example 2The Virtual Link is configured between fw1 and fw2 on Area 1, as it is used as the transit a

Strany 11

In a dynamic routing environment, it is important for routers to be able to regulate to what extentthey will participate in the routing exchange. It i

Strany 12 - Examples

gw-world:/ImportOSPFRoutes> add DynamicRoutingRuleAddRouteDestination=MainRoutingTableWeb Interface1. Go to Routing > Dynamic Routing Rules2. Cl

Strany 13 - Important

5.1. Setting up a DHCP server ... 1285.2. Checking the status of a DHCP ser

Strany 14 - Chapter 1. Product Overview

4.5. Multicast Routing4.5.1. OverviewCertain types of Internet interactions, such as conferencing and video broadcasts, require a singleclient or host

Strany 15

The multiplex rule can operate in one of two modes:Use IGMPThe traffic flow specififed by the multiplex rule must have been requestedby hosts using IG

Strany 16 - 1.2. NetDefendOS Architecture

Example 4.8. Forwarding of Multicast Traffic using the SAT Multiplex RuleIn this example, we will create a multiplex rule in order to forward the mult

Strany 17 - 1.2.3. Basic Packet Flow

This scenario is based on the previous scenario but now we are going to translate the multicastgroup. When the multicast streams 239.192.10.0/24 are f

Strany 18

• Destination Interface: core• Destination Network: 239.192.10.0/244. Click the Address Translation tab5. Add interface if1 but leave the IPAddress em

Strany 19

Figure 4.7. Multicast ProxyIn Snoop mode, the router will act transparently between the hosts and another IGMP router. It willnot send any IGMP Querie

Strany 20

• Source Network: if1net, if2net, if3net• Destination Interface: core• Destination Network: auto• Multicast Source: 192.168.10.1• Multicast Group: 239

Strany 21

• Name: A suitable name for the rule, eg. Reports_if1• Type: Report• Action: Proxy• Output: wan (this is the relay interface)3. Under Address Filter e

Strany 22

• Type: Report• Action: Proxy• Output: wan (this is the relay interface)3. Under Address Filter enter:• Source Interface: if2• Source Network: if2net•

Strany 23 - Management Interfaces

4.6. Transparent Mode4.6.1. Overview of Transparent ModeDeploying D-Link Firewalls operating in Transparent Mode into an existing network topology can

Strany 24 - Serial Console CLI Access

PrefaceIntended AudienceThe target audience for this reference guide is Administrators who are responsible for configuringand managing D-Link Firewall

Strany 25 - Changing the CLI Prompt

When beginning communication, a host will locate the target host's physical address bybroadcasting an ARP request. This request is intercepted by

Strany 26 - 2.1.4. The WebUI

Figure 4.8. Transparent mode scenario 1Example 4.13. Setting up Transparent Mode - Scenario 1Web InterfaceConfigure the interfaces:1. Go to Interfaces

Strany 27 - Interface Layout

• Destination Interface: any• Source Network: 10.0.0.0/24• Destination Network: all-nets (0.0.0.0/0)3. Click OKScenario 2Here the D-Link Firewall in T

Strany 28

Switch Route:Similar as shown in the previous example. Set up the switch route with the new interface group created earlier.Configure the rules:1. Go

Strany 29

1. Go to Interfaces > Ethernet > Edit (lan)2. Now enter:• IP Address: 10.0.0.1• Network: 10.0.0.0/24• Transparent Mode: Disable• Add route for i

Strany 30

3. Click OK4. Go to Rules > IP Rules > Add > IPRule5. Now enter:• Name: HTTP-WAN-to-DMZ• Action: SAT• Service: http• Source Interface: wan• D

Strany 31

4.6.6. Transparent Mode Scenarios Chapter 4. Routing126

Strany 32 - Listing Modified Objects

Chapter 5. DHCP ServicesThis chapter describes DHCP services in NetDefendOS.• Overview, page 127• DHCP Servers, page 128• Static DHCP Assignment, page

Strany 33 - Committing IPsec Changes

5.2. DHCP ServersNetDefendOS has the ability to act as one or more logical DHCP servers. Filtering of DHCP clientrequests is based on interface, so ea

Strany 34

Example 5.2. Checking the status of a DHCP serverWeb InterfaceGo to Status > DHCP Server in the menu bar.CLITo see the status of all servers:gw-wor

Strany 35 - 2.2.2. Event Messages

Highlighted ContentSpecial sections of text which the reader should pay special attention to are indicated by icons on theleft hand side of the page f

Strany 36

5.3. Static DHCP AssignmentWhere the administrator requires a fixed relationship between a client and the assigned IP address,NetDefendOS allows the a

Strany 37 - 2.2.3.2. SNMP Traps

5.4. DHCP RelayingWith DHCP, clients send requests to locate the DHCP server(s) using broadcast messages.However, broadcasts are normally only propaga

Strany 38

5.5. IP PoolsOverviewIP pools are used to offer other subsystems access to a cache of DHCP IP addresses. Theseaddresses are gathered into a pool by in

Strany 39 - START Message Parameters

greater than the prefetch parameter. The pool will start releasing (givingback IPs to the DHCP server) when the number of free clients exceedsthis val

Strany 40 - STOP Message Parameters

5.5. IP Pools Chapter 5. DHCP Services134

Strany 41

Chapter 6. Security MechanismsThis chapter describes NetDefendOS security features.• Access Rules, page 135• Application Layer Gateways, page 138• Web

Strany 42 - 2.3.9. Limitations with NAT

VPNs provide one means of avoiding spoofing but where a VPN is not an appropriate solution thenAccess Rules can provide an anti-spoofing capability by

Strany 43 - 2.4. Monitoring

Example 6.1. Setting up an Access RuleA rule is to be defined that ensures no traffic with a source address not within the lannet network is received

Strany 44 - Preventing SNMP Overload

6.2. Application Layer Gateways6.2.1. OverviewTo complement low-level packet filtering, which only inspects packet headers in protocols such IP,TCP, U

Strany 45 - 2.5. Maintenance

ALGs and Syn Flood ProtectionIt should be noted that user-defined custom Service objects have the option to enable Syn FloodProtection, a feature whic

Strany 46 - Web Interface

Chapter 1. Product OverviewThis chapter outlines the key features of NetDefendOS.• About D-Link NetDefendOS, page 14• NetDefendOS Architecture, page 1

Strany 47

• Block Selected means that those filetypes marked will be automatically blocked asdownloads. A file's contents will be analyzed to identify the

Strany 48 - Chapter 3. Fundamentals

client on the internal network connects through the firewall to an FTP server on the Internet. The IPrule is then configured to allow network traffic

Strany 49

To make it possible to connect to this server from the Internet using the FTP ALG, the FTP ALG and rules shouldbe configured as follows:Web InterfaceA

Strany 50 - 3.1.3. Ethernet Addresses

2. Now enter:• Name: SAT-ftp-inbound• Action: SAT• Service: ftp-inbound3. For Address Filter enter:• Source Interface: any• Destination Interface: cor

Strany 51 - 3.1.4. Address Groups

4. Click OKExample 6.3. Protecting FTP ClientsIn this scenario shown below the D-Link Firewall is protecting a workstation that will connect to FTP se

Strany 52 - 3.2. Services

• Destination: 21 (the port the ftp server resides on)• ALG: select the newly created ftp-outbound3. Click OKRules (Using Public IPs). The following r

Strany 53

TFTP is widely used in enterprise environments for updating software and backing upconfigurations on network devices. TFTP is recognised as being an i

Strany 54 - Using All Services

Email Rate LimitingA maximum allowable rate of email messages can bespecified.Email Size LimitingA maximum allowable size of email messages can bespec

Strany 55 - 3.2.3. ICMP Services

When the NetDefendOS SPAM filtering function is configured, the IP address of the email'ssending server can be sent to one or more DNSBL servers

Strany 56

Buy this stock today!And if the tag text is defined to be "*** SPAM ***", then the modified email's Subject field willbecome:*** SPAM *

Strany 57 - 3.3.1. Overview

hosts. For more information about the IDP capabilities ofNetDefendOS, please see Section 6.5, “Intrusion Detectionand Prevention”.Anti-VirusNetDefendO

Strany 58 - Ethernet Interface Names

LoggingThere are three types of logging done by the SPAM filtering module:• Logging of dropped or SPAM tagged emails - These log messages include the

Strany 59 - The Default Gateway

gw-world:/> dnsblDNSBL Contexts:Name Status Spam Drop Accept------------------------ -------- -------- -------- --------my_smtp_alg active 156 65 3

Strany 60 - 3.3.3. VLAN

Hide UserThis option prevents the POP3 server from revealing that ausername does not exist. This prevents users from tryingdifferent usernames until t

Strany 61 - 3.3.4. PPPoE

VOIP see also Section 6.2.8, “H.323”.)SIP ComponentsThe following components are the logical building blocks for SIP communication:User AgentsThese ar

Strany 62 - Dial-on-demand

Maximum Sessions per IDThe number of simultaneous sessions that a single peer can beinvolved with is restricted by this value. The default numberis 5.

Strany 63 - 3.3.5. GRE Tunnels

• A NAT rule for outbound traffic from user agents on the internal network to the SIP ProxyServer located externally. The SIP ALG will take care of al

Strany 64 - An Example GRE Scenario

GatewaysAn H.323 gateway connects two dissimilar networks andtranslates traffic between them. It provides connectivitybetween H.323 networks and non-H

Strany 65

• The H.323 ALG supports version 5 of the H.323 specification. This specification is built uponH.225.0 v5 and H.245 v10.• In addition to support voice

Strany 66 - 3.3.6. Interface Groups

Web InterfaceOutgoing Rule:1. Go to Rules > IP Rules > Add > IPRule2. Now enter:• Name: H323AllowOut• Action: Allow• Service: H323• Source In

Strany 67 - 3. Click OK

Example 6.5. H.323 with private IP addressesIn this scenario a H.323 phone is connected to the D-Link Firewall on a network with private IP addresses.

Strany 68 - 3.4. ARP

1.2. NetDefendOS Architecture1.2.1. State-based ArchitectureThe NetDefendOS architecture is centered around the concept of state-based connections.Tra

Strany 69 - Size of the ARP Cache

• Destination Interface: core• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: wan_ip (external IP of the firewall)• Comment: Allow incomin

Strany 70 - Published ARP Entries

1. Go to Rules > IP Rules > Add > IPRule2. Now enter:• Name: H323AllowIn• Action: Allow• Service: H323• Source Interface: any• Destination In

Strany 71 - 3.4.5. Advanced ARP Settings

• Destination Interface: core• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: wan_ip (external IP of the firewall)• Comment: Allow incomin

Strany 72 - Matching Ethernet Addresses

Web InterfaceIncoming Gatekeeper Rules:1. Go to Rules > IP Rules > Add > IPRule2. Now enter:• Name: H323In• Action: SAT• Service: H323-Gateke

Strany 73 - Policy Characteristics

NoteThere is no need to specify a specific rule for outgoing calls. NetDefendOS monitorsthe communication between "external" phones and the

Strany 74 - Non-matching Traffic

is possible for internal phones to call the external phones that are registered with thegatekeeper.Example 6.10. Using the H.323 ALG in a Corporate En

Strany 75 - Bi-directional Connections

• Comment: Allow H.323 entities on lannet to connect to the Gatekeeper3. Click OK1. Go to Rules > IP Rules > Add > IPRule2. Now enter:• Name:

Strany 76 - Using Reject

1. Go to Rules > IP Rules > Add > IPRule2. Now enter:• Name: BranchToGW• Action: Allow• Service: H323-Gatekeeper• Source Interface: vpn-remot

Strany 77 - 3.6. Schedules

• Service: H323-Gatekeeper• Source Interface: dmz• Destination Interface: vpn-hq• Source Network: ip-branchgw• Destination Network: hq-net• Comment: A

Strany 78

6.3. Web Content Filtering6.3.1. OverviewWeb traffic is one of the biggest sources for security issues and misuse of the Internet. Inappropriatesurfin

Strany 79 - Validity Time

1.2.3. Basic Packet FlowThis section outlines the basic flow in the state-engine for packets received and forwarded byNetDefendOS. Please note that th

Strany 80 - Reusing Root Certificates

Example 6.13. Stripping ActiveX and Java appletsThis example shows how to configure a HTTP Application Layer Gateway to strip ActiveX and Java applets

Strany 81 - NetDefendOS

NoteWeb content filtering URL blacklisting is a separate concept from Section 6.7,“Blacklisting Hosts and Networks”.Example 6.14. Setting up a white a

Strany 82 - 3.8. Setting Date and Time

6.3.4. Dynamic Web Content FilteringOverviewNetDefendOS supports Dynamic Web Content Filtering (WCF) of web traffic, which enables anadministrator to

Strany 83 - 3.8.2. Time Servers

NoteNew, uncategorized URLs sent to the D-Link network are treated as anonymoussubmissions and no record of the source of new submissions is kept.Cate

Strany 84

5. In the Blocked Categories list, select Search Sites and click the >> button.6. Click OKThen, create a Service object using the new HTTP ALG:1

Strany 85 - Synchronization Intervals

FilteringCategories=SEARCH_SITESWeb InterfaceFirst, create an HTTP Application Layer Gateway (ALG) Object:1. Go to Objects > ALG > Add > HTTP

Strany 86 - D-Link Time Servers

Example 6.17. Reclassifying a blocked siteThis example shows how a user may propose a reclassification of a web site if he believes it is wrongly clas

Strany 87 - 3.9. DNS Lookup

Category 2: NewsA web site may be classified under the News category if its content includes information articles onrecent events pertaining to topics

Strany 88

• www.buy-alcohol.seCategory 7: EntertainmentA web site may be classified under the Entertainment category if its content includes any generalform of

Strany 89

• www.loadsofmoney.com.au• www.putsandcalls.comCategory 12: E-BankingA web site may be classified under the E-Banking category if its content includes

Strany 90 - 4.2. Static Routing

and the event is logged according to the log settings for the rule.If the action is Allow, the packet is allowed through the system. A corresponding s

Strany 91 - NetDefendOS Route Notation

Category 17: www-Email SitesA web site may be classified under the www-Email Sites category if its content includes online,web-based email facilities.

Strany 92 - Displaying the Routing Table

Examples might be:• www.sierra.org• www.walkingclub.orgCategory 23: Music DownloadsA web site may be classified under the Music Downloads category if

Strany 93 - Core Routes

A web site may be classified under the Drugs/Alcohol category if its content includes drug andalcohol related information or services. Some URLs categ

Strany 94 - 4.2.3. Route Failover

6.4. Anti-Virus Scanning6.4.1. OverviewThe NetDefendOS Anti-Virus module protects against malicious code carried in file downloads.Files may be downlo

Strany 95 - Re-enabling Routes

D-Link Firewall. However, the available free memory can place a limit on the number of concurrentscans that can be initiated. The administrator can in

Strany 96 - 4.2.4. Proxy ARP

1. General optionsModeThis must be one of:A. Enabled which means Anti-Virus is active.B. Audit which means it is active but logging will be the only a

Strany 97

Enabling of this function is recommended to make sure this form of attack cannot allow a virus toget through. The possible MIME types that can be chec

Strany 98 - 4.3.1. Overview

1. Go to Objects > ALG > Add > HTTP ALG2. Specify a suitable name for the ALG, for instance anti_virus3. Click the Antivirus tab4. Select Pro

Strany 99 - 4.3.5. The Ordering parameter

6.5. Intrusion Detection and Prevention6.5.1. OverviewIntrusion DefinitionComputer servers can sometimes have vulnerabilites which leave them exposed

Strany 100

DFL-210/800/1600/2500 firewalls. This is a simplfied IDP that gives basic protection againstattacks. It is upgradeable to the professional level Advan

Strany 101

1.3. NetDefendOS State Engine Packet FlowThe diagrams in this section provide a summary of the flow of packets through the NetDefendOSstate-engine. Th

Strany 102

The console command> updatecenter -statuswill show the current status of the auto-update feature. This can also be done through the WebUI.Updating

Strany 103 - 4.4. Dynamic Routing

The option exists in NetDefendOS IDP to look for intrusions in all traffic, even the packets that arerejected by the IP rule set check for new connect

Strany 104 - OSPF Areas

• Increasing throughput - Where the highest throughout possible is desirable, then turning theoption off, can provide a slight increase in processing

Strany 105 - Aggregates

Using GroupsUsually, several lines of attacks exist for a specific protocol, and it is best to search for all of them atthe same time when analyzing n

Strany 106 - A Partitioned Backbone

group name.Caution against using too many IDP signaturesDo not use the entire signature database and avoid using signatures and signaturegroups uneces

Strany 107 - 4.4.3. Dynamic Routing Policy

triggered. At least one new event occurs within the Hold Time of 120 seconds, thus reaching the log thresholdlevel (at least 2 events have occurred).

Strany 108

CLICreate IDP Rule:gw-world:/> add IDPRule Service=smtp SourceInterface=wan SourceNetwork=wannetDestinationInterface=dmz DestinationNetwork=ip_mail

Strany 109

When this IDP Rule has been created, an action must also be created, specifying what signatures the IDP shoulduse when scanning data matching the IDP

Strany 110 - 4.5.1. Overview

6.6. Denial-Of-Service (DoS) Attacks6.6.1. OverviewBy embracing the Internet, enterprises experience new business opportunities and growth. Theenterpr

Strany 111

to run "ping -l 65510 1.2.3.4" on a Windows 95 system where 1.2.3.4 is the IP address of theintended victim. "Jolt" is simply a pu

Strany 112 - Chapter 4. Routing

User Manual DFL-210/260/800/860/1600/2500 NetDefendOS version 2.20 D-Link NetDefend Security http://security.dlink.com.tw Published 2008

Strany 113

Figure 1.2. Packet Flow Schematic Part IIThe packet flow is continued on the following page.Figure 1.3. Packet Flow Schematic Part III1.3. NetDefendOS

Strany 114 - 4.5.3. IGMP Configuration

services expected to only serve the local network.• By stripping the URG bit by default from all TCP segments traversing the system (configurablevia A

Strany 115 - Figure 4.7. Multicast Proxy

The Traffic Shaping feature built into NetDefendOS also help absorb some of the flood before itreaches protected servers.6.6.8. TCP SYN Flood AttacksT

Strany 116

6.7. Blacklisting Hosts and NetworksNetDefendOS implements a Blacklist of host or network IP addresses which can be utilized toprotect against traffic

Strany 117

6.7. Blacklisting Hosts and Networks Chapter 6. Security Mechanisms203

Strany 118 - Advanced IGMP Settings

Chapter 7. Address TranslationThis chapter describes NetDefendOS address translation capabilities.• Dynamic Network Address Translation, page 204• NAT

Strany 119 - 4.6. Transparent Mode

Publish entry configured for the egress interface. Otherwise, thereturn traffic will not be received by the D-Link Firewall.The following example illu

Strany 120 - Scenario 1

Protocols Handled by NATDynamic address translation is able to deal with the TCP, UDP and ICMP protocols with a goodlevel of functionality since the a

Strany 121

7.2. NAT PoolsOverviewAs discussed in Section 7.1, “Dynamic Network Address Translation”, NAT provides a way to havemultiple internal clients and host

Strany 122 - Scenario 2

Stateless NAT PoolsThe Stateless option means that no state table is maintained and the external IP address chosen foreach new connection is the one t

Strany 123

2. Specify a suitable name for the IP range nat_pool_range3. Enter 10.6.13.10-10.16.13.15 in the IP Address textbox(a network eg 10.6.13.0/24 could be

Strany 124

1.3. NetDefendOS State Engine PacketFlowChapter 1. Product Overview21

Strany 125

7.3. Static Address TranslationNetDefendOS can translate entire ranges of IP addresses and/or ports. Such translations aretranspositions, that is, eac

Strany 126

Then create a corresponding Allow rule:1. Go to Rules > IP Rules > Add > IPRule2. Specify a suitable name for the rule, eg. Allow_HTTP_To_DMZ

Strany 127 - Chapter 5. DHCP Services

# Action Src Iface Src Net Dest Iface Dest Net Parameters3 Allow ext2 ext2net core wan_ip http4 NAT lan lannet any all-nets AllThis increases the numb

Strany 128 - 5.2. DHCP Servers

• NetDefendOS translates the address in accordance with rule 1 and forwards the packet in accordance withrule 2:10.0.0.3:1038 => 10.0.0.2:80• wwwsr

Strany 129

An example of when this is useful is when having several protected servers in a DMZ, and whereeach server should be accessible using a unique public I

Strany 130 - 5.3. Static DHCP Assignment

4. Click OKPublish the public adresses in the wan interface using ARP publish. One ARP item is needed for every IPaddress:1. Go to Interfaces > ARP

Strany 131 - 5.4. DHCP Relaying

NetDefendOS can be used to translate ranges and/or groups into just one IP address.# Action Src Iface Src Net Dest Iface Dest Net Parameters1 SAT any

Strany 132 - Advanced IP Pool Options

configuration.There is no definitive list of what protocols that can or cannot be address translated. A general ruleis that VPN protocols cannot usual

Strany 133 - Using Prefetched Leases

# Action Src Iface Src Net Dest Iface Dest Net Parameters5 NAT lan lannet any all-nets AllWhat happens now?• External traffic to wan_ip:80 will match

Strany 134

7.3.7. SAT and FwdFast Rules Chapter 7. Address Translation219

Strany 135 - 6.1.2. IP spoofing

1.3. NetDefendOS State Engine PacketFlowChapter 1. Product Overview22

Strany 136 - 6.1.3. Access Rule Settings

Chapter 8. User AuthenticationThis chapter describes how NetDefendOS implements user authentication.• Overview, page 220• Authentication Setup, page 2

Strany 137

8.2. Authentication Setup8.2.1. Setup SummaryThe following list summarizes the steps for User Authentication setup with NetDefendOS:• Set up a databas

Strany 138 - Maximum Connection Sessions

NetDefendOS acts as a RADIUS client, sending user credentials and connection parameterinformation as a RADIUS message to a nominated RADIUS server. Th

Strany 139 - 6.2.2. HTTP

combination.• Allow only one login per username.• Allow one login per username and logout an existing user with the same name if they have beenidle fo

Strany 140 - FTP Security Issues

Changing the Management WebUI PortHTTP authentication will collide with the WebUI's remote management service which also usesTCP port 80. To avoi

Strany 141 - The Solution

Action Src Interface Src Network Dest Interface Dest Network Service1 Allow lan lannet core lan_ip http-all2 NAT lan trusted_users wan all-nets http-a

Strany 142

Example 8.1. Creating an authentication user groupIn the example of an authentication address object in the Address Book, a user group "users&quo

Strany 143

• Source Network: lannet• Destination Interface core• Destination Network lan_ip3. Click OKB. Set up the Authentication Rule1. Go to User Authenticati

Strany 144

d. Port: 1812 (RADIUS service uses UDP port 1812 by default)e. Retry Timeout: 2 (NetDefendOS will resend the authentication request to the sever if th

Strany 145 - 6.2.4. TFTP

Chapter 9. VPNThis chapter describes VPN usage with NetDefendOS.• Overview, page 229• VPN Quickstart Guide, page 231• IPsec, page 240• IPsec Tunnels,

Strany 146 - SMTP ALG Options

Chapter 2. Management and MaintenanceThis chapter describes the management, operations and maintenance related aspects ofNetDefendOS.• Managing NetDef

Strany 147 - 6.2.5.1. DNSBL SPAM Filtering

• Protecting mobile and home computers• Restricting access through the VPN to needed services only, since mobile computers arevulnerable• Creating DMZ

Strany 148 - Tagging SPAM Emails

9.2. VPN Quickstart GuideLater sections in this chapter will explore VPN components in detail. To help put those latersections in context, this sectio

Strany 149 - Verifying the Sender Email

the Destination Interface. The rule's Destination Network is the remote networkremote_net.• An Allow rule for inbound traffic that has the previo

Strany 150 - The dnsbl CLI Command

Authentication section of an IP object. If that IP object is then used as the SourceNetwork of a rule in the IP rule set, that rule will only apply to

Strany 151 - POP3 ALG Options

• Create a Config Mode Pool object (there can only be one associated with a NetDefendOSinstallation) and associate with it the IP Pool object defined

Strany 152 - 6.2.7. SIP

3. Define a Pre-shared Key for the IPsec tunnel.4. Define an IPsec Tunnel object (let's call this object ipsec_tunnel) with the followingparamete

Strany 153 - SIP Configuration Options

Action Src Interface Src Network Dest Interface Dest Network ServiceAllow l2tp_tunnel l2tp_pool any int_net AllNAT ipsec_tunnel l2tp_pool ext all-nets

Strany 154 - SIP Setup Summary

• An int_net object which is the internal network from which the addresses come.• An ip_int object which is the internal IP address of the interface c

Strany 155 - H.323 Components

• If certificates have been used, check that the correct certificates have been used and that theyhaven't expired.• Use ICMP Ping to confirm that

Strany 156 - H.323 ALG features

IPsec Tunnel Local Net Remote Net Remote GW------------ -------------- ------------ -------------L2TP_IPSec 214.237.225.43 84.13.193.179 84.13.193.179

Strany 157 - H.323 ALG Configuration

By default, NetDefendOS has a local user database, AdminUsers, with one user account pre-defined:• Username admin with password admin.This account has

Strany 158

9.3. IPsec9.3.1. OverviewInternet Protocol Security (IPsec), is a set of protocols defined by the Internet Engineering TaskForce (IETF) to provide IP

Strany 159

IKE NegotiationThe process of negotiating session parameters consists of a number of phases and modes. These aredescribed in detail in the below secti

Strany 160

Authentication can be accomplished through Pre-Shared Keys, certificates or public key encryption.Pre-Shared Keys is the most common authentication me

Strany 161

configurations.Remote GatewayThe remote gateway will be doing thedecryption/authentication and pass the data on to its finaldestination. This field ca

Strany 162

• Cast128• 3DES• DESDES is only included to be interoperable with other olderVPN implementations. Use of DES should be avoidedwhenever possible, since

Strany 163

PFS GroupThis specifies the PFS group to use with PFS.The PFS groups supported by NetDefendOS are:• 1 modp 768-bit• 2 modp 1024-bit• 5 modp 1536-bitSe

Strany 164

method where IKE is not used at all; the encryption and authentication keys as well as some otherparameters are directly configured on both sides of t

Strany 165

roaming clients. Instead, should a client be compromised, the client's certificate can simply berevoked. No need to reconfigure every client.Cert

Strany 166

9.3.5. NAT TraversalBoth IKE and IPsec protocols present a problem in the functioning of NAT. Both protocols were notdesigned to work through NATs and

Strany 167

configuration is needed. However, for responding firewalls two points should be noted:• On responding firewalls, the Remote Gateway field is used as a

Strany 168

SSH (Secure Shell) CLI AccessThe SSH (Secure Shell) protocol can be used to access the CLI over the network from a remotehost. SSH is a protocol prima

Strany 169 - 6.3.1. Overview

1. Go to Objects > VPN Objects > IKE Algorithms > Add > IPsec Algorithms2. Enter a name for the list eg. esp-l2tptunnel.3. Now check the f

Strany 170 - Wildcarding

1. Go to Objects > Authentication Objects > Add > Pre-shared key2. Enter a name for the pre-shared key eg. MyPSK3. Choose Hexadecimal Key and

Strany 171

gw-world:/MyIDList> ccFinally, apply the Identification List to the IPsec tunnel:gw-world:/> set Interface IPsecTunnel MyIPsecTunnel AuthMethod=

Strany 172 - URL Processing Flow

9.4. IPsec Tunnels9.4.1. OverviewAn IPsec Tunnel defines an endpoint of an encrypted tunnel. Each IPsec Tunnel is interpreted as alogical interface by

Strany 173 - Activation

computer from different locations is a typical example of a roaming client. Apart from the need forsecure VPN access, the other major issue with roami

Strany 174 - Audit Mode

5. Under the Routing tab:• Enable the option: Dynamically add route to the remote network when a tunnel is established.6. Click OKC. Finally configure

Strany 175 - Allowing Override

3. For Algorithms enter:• IKE Algorithms: Medium or High• IPsec Algorithms: Medium or High4. For Authentication enter:• Choose X.509 Certificate as au

Strany 176 - Category 1: Adult Content

3. Click OK4. Go to Objects > VPN Objects > ID List > Sales > Add > ID5. Enter the name for the client6. Select Email as Type7. In the

Strany 177 - Category 6: Shopping

Currently only one Config Mode object can be defined in NetDefendOS and this is referred to as theConfig Mode Pool object. The key parameters associat

Strany 178 - Category 11: Investment Sites

message includes the two IP addresses as well as the client identity.Optionally, the affected SA can be automatically deleted if validation fails by e

Strany 179 - Category 16: Sports

Device:/> set device name="gw-world"The CLI Reference Guide uses the command prompt gw-world:/> throughout.NoteWhen the command line p

Strany 180

9.5. PPTP/L2TPThe access by a client using a modem link over dial-up public switched networks, possibly with anunpredictable IP address, to protected

Strany 181

gw-world:/> add Interface L2TPServer MyPPTPServer ServerIP=lan_ip Interface=anyIP=wan_ip IPPool=pp2p_Pool TunnelProtocol=PPTP AllowedRoutes=all-net

Strany 182 - Category 31: Spam

3. Now enter:• Inner IP Address: ip_l2tp• Tunnel Protocol: L2TP• Outer Interface Filter: l2tp_ipsec• Outer Server IP: wan_ip4. Under the PPP Parameter

Strany 183 - 6.4. Anti-Virus Scanning

DHCPOverIPsec=Yes AddRouteToRemoteNet=Yes IPsecLifeTimeKilobytes=250000IPsecLifeTimeSeconds=3600Web Interface1. Go to Interfaces > IPsec > Add &

Strany 184 - 6.4.6. Anti-Virus Options

7. In the ProxyARP control, select the lan interface.8. Click OKIn order to authenticate the users using the L2TP tunnel, a user authentication rule n

Strany 185 - Verifying the MIME Type

4. Click OK5. Go to Rules > IP Rules > Add > IPRule6. Enter a name for the rule, eg. NATL2TP7. Now enter:• Action: NAT• Service: all_services

Strany 186

9.5.2. L2TP Chapter 9. VPN266

Strany 187

Chapter 10. Traffic ManagementThis chapter describes how NetDefendOS can manage network traffic.• Traffic Shaping, page 267• Threshold Rules, page 279

Strany 188 - 6.5.1. Overview

• Providing bandwidth guarantees. This is typically accomplished by treating a certain amount oftraffic (the guaranteed amount) as high priority. Traf

Strany 189 - IDP, IPS and IDS

Figure 10.1. Pipe rule set to Pipe Packet FlowWhere one pipe is specified in a list then that is the pipe whose characteristics will be applied to the

Strany 190 - Checking Dropped Packets

Enter your username and password and click the Login button. If the user credentials are correct,you will be transferred to the main web interface pag

Strany 191

CLIgw-world:/> add PipeRule ReturnChain=std-in SourceInterface=lanSourceNetwork=lannet DestinationInterface=wanDestinationNetwork=all-nets Service=

Strany 192 - 6.5.6. IDP Signature Groups

gw-world:/> add Pipe std-out LimitKbpsTotal=2000Web Interface1. Go to Traffic Management > Traffic Shaping > Pipes > Add > Pipe2. Speci

Strany 193

Setting up pipes in this way only puts limits on the maximum values for certain traffic types. It doesnot give priorities to different types of compet

Strany 194 - 6.5.7. IDP Actions

These limits can be specified in kilobits per second and/or packets per second (if both are specifiedthen the first limit reached will be the limit us

Strany 195

for other services such as surfing, DNS or FTP. A means is therefore required to ensure that lowerpriority traffic gets some portion of bandwidth and

Strany 196

telnet-in pipes.Notice that we did not set a total limit for the ssh-in and telnet-in pipes. We do not need to since thetotal limit will be enforced b

Strany 197

Instead of specifying a total group limit, the alternative is to enable the Dynamic Balancing option.This ensures that the available bandwidth is divi

Strany 198 - 6.6.2. DoS Attack Mechanisms

specifying a "Per DestinationIP" grouping. Knowing when the pipe is full is not important since theonly constraint is on each user. If prece

Strany 199 - 6.6.6. The WinNuke attack

• A pipe can have a limit which is the maximum amount of traffic allowed.• A pipe can only know when it is full if a limit is specified.• A single pip

Strany 200

10.2. Threshold Rules10.2.1. OverviewThe objective of a Threshold Rule is to have a means of detecting abnormal connection activity aswell as reacting

Strany 201 - 6.6.9. The Jolt2 Attack

• Home - Navigates to the first page of the web interface.• Configuration• Save and Activate - Saves and activates the configuration.• Discard Changes

Strany 202 - Whitelisting

10.2.5. Multiple Triggered ActionsWhen a rule is triggered then NetDefendOS will perform the associated rule Actions that match thecondition that has

Strany 203

10.3. Server Load Balancing10.3.1. OverviewThe Server Load Balancing (SLB) feature in NetDefendOS is a powerful tool that can improve thefollowing asp

Strany 204

SLB also means that network administrators can perform maintenance tasks on servers orapplications without disrupting services. Individual servers can

Strany 205

algorithm cycles through the server list and redirects the load to servers inorder. Regardless of each server's capability and other aspects, for

Strany 206 - Protocols Handled by NAT

If Connection Rate is applied instead, R1 and R2 will be sent to the same server because ofstickiness, but the subsequent requests R3 and R4 will be r

Strany 207 - Stateful NAT Pools

The key component in setting up SLB is the SLB_SAT rule in the IP rule set. The steps that shouldbe followed are:1. Define an Object for each server f

Strany 208 - Using NAT Pools

4. Click OK5. Repeat the above to create an object called server2 for the 192.168.1.11 IP address.B. Create a Group which contains the 2 webserver obj

Strany 209

• Service: HTTP• Source Interface: any• Source Network: all-nets• Destination Interface: core• Destination Network: ip_ext3. Click OK10.3.6. SLB_SAT R

Strany 210

10.3.6. SLB_SAT Rules Chapter 10. Traffic Management288

Strany 211 - Address (1:1)

Chapter 11. High AvailabilityThis chapter describes the high availability fault-tolerance feature in D-Link Firewalls.• Overview, page 289• High Avail

Strany 212

• User Database: AdminUsers• Interface: any• Network: all-nets5. Click OKCautionThe above example is provided for informational purposes only. It is n

Strany 213

D-Link HA will only operate between two D-Link Firewalls. As the internal operation of differentsecurity gateway manufacturer's software is compl

Strany 214

11.2. High Availability MechanismsD-Link HA provides a redundant, state-synchronized hardware configuration. The state of the activeunit, such as the

Strany 215

packets destined for the shared hardware address.11.2. High Availability Mechanisms Chapter 11. High Availability292

Strany 216 - 7.3.4. Port Translation

11.3. High Availability SetupThis section provides a step-by-step guide for setting up an HA Cluster.11.3.1. Hardware Setup1. Start with two physicall

Strany 217 - 7.3.7. SAT and FwdFast Rules

3. Decide on a shared IP address for each interface in the cluster. Some interfaces could haveshared addresses only with others having unique individu

Strany 218

This device is an HA MASTERThis device is currently ACTIVE (will forward traffic)HA cluster peer is ALIVEThen use the stat command to verify that both

Strany 219

11.4. High Availability IssuesThe following points should be kept in mind when managing and configuring an HA Cluster.SNMPSNMP statistics are not shar

Strany 220 - Using Username/Passwords

11.4. High Availability Issues Chapter 11. High Availability297

Strany 221 - 8.2. Authentication Setup

Chapter 12. ZoneDefenseThis chapter describes the D-Link ZoneDefense feature.• Overview, page 298• ZoneDefense Switches, page 299• ZoneDefense Operati

Strany 222 - Multiple Logins

12.2. ZoneDefense SwitchesSwitch information regarding every switch that is to be controlled by the firewall has to be manuallyspecified in the firewa

Strany 223 - 8.2.6. HTTP Authentication

User ManualDFL-210/260/800/860/1600/2500NetDefendOS version 2.20Published 2008-08-05Copyright © 2008Copyright NoticeThis publication, including all ph

Strany 224 - Forcing Users to a Login Page

gw-world:/> show ServiceA list of all services will be displayed, grouped by their respective type.Web Interface1. Go to Objects > Services2. A

Strany 225

12.3. ZoneDefense Operation12.3.1. SNMPSimple Network Management Protocol (SNMP) is an application layer protocol for complexnetwork management. SNMP

Strany 226

As a complement to threshold rules, it is also possible to manually define hosts and networks thatare to be statically blocked or excluded. Manually b

Strany 227

2. For Addresses choose the object name of the firewall's interface address 192.168.1.1 from the Available listand put it into the Selected list.

Strany 228

12.3.4. Limitations Chapter 12. ZoneDefense303

Strany 229 - Chapter 9. VPN

Chapter 13. Advanced SettingsThis chapter describes the configurable advanced setings for NetDefendOS. The settings are dividedup into the following c

Strany 230 - 9.1.4. Key Distribution

LogNonIP4Logs occurrences of IP packets that are not version 4. NetDefendOS only accepts version 4 IPpackets; everything else is discarded.Default: 25

Strany 231 - 9.2. VPN Quickstart Guide

Verifies that the size information contained in each "layer" (Ethernet, IP, TCP, UDP, ICMP) isconsistent with that of other layers.Default:

Strany 232 - Interface Network Gateway

13.2. TCP Level SettingsTCPOptionSizesVerifies the size of TCP options. This function acts in the same way as IPOptionSizes describedabove.Default: Va

Strany 233

Default: 7000 bytesTCPZeroUnusedACKDetermines whether NetDefendOS should set the ACK sequence number field in TCP packets tozero if it is not used. So

Strany 234 - Configuring the IPsec Client

to transport alternate checksums where permitted by ALTCHKREQ above. Normally never seen onmodern networks.Default: StripLogTCPOPT_CCDetermines how Ne

Strany 235

Example 2.5. Editing a Configuration ObjectWhen you need to modify the behavior of NetDefendOS, you will most likely need to modify one or severalconf

Strany 236 - 9.2.6. PPTP Roaming Clients

Specifies how NetDefendOS will deal with TCP packets with either the Xmas or Ymas flag turnedon. These flags are currently mostly used by OS Fingerpri

Strany 237 - 9.2.7. VPN Troubleshooting

13.3. ICMP Level SettingsICMPSendPerSecLimitSpecifies the maximum number of ICMP messages NetDefendOS may generate per second. Thisincludes ping repli

Strany 238 - The ipsecstat console command

13.4. ARP SettingsARPMatchEnetSenderDetermines if NetDefendOS will require the sender address at Ethernet level to comply with thehardware address rep

Strany 239 - The ikesnoop console command

ARPExpireSpecifies how long a normal dynamic item in the ARP table is to be retained before it is removedfrom the table.Default: 900 seconds (15 minut

Strany 240 - 9.3.1. Overview

13.5. Stateful Inspection SettingsLogConnectionUsageThis generates a log message for every packet that passes through a connection that is set up in t

Strany 241 - IKE Proposals

• NoLog – Does not log any connections; consequently, it will not matter if logging is enabled foreither Allow or NAT rules in the Rules section; they

Strany 242 - IKE Parameters

13.6. Connection TimeoutsThe settings in this section specify how long a connection can remain idle, ie. no data being sentthrough it, before it is au

Strany 243

Default: FalseAllowBothSidesToKeepConnAlive_UDP Chapter 13. Advanced Settings317

Strany 244

13.7. Size Limits by ProtocolThis section contains information about the size limits imposed on the protocols directly under IPlevel, ie. TCP, UDP, IC

Strany 245 - Manual Keying

MaxSKIPLenSpecifies the maximum size of a SKIP packet.Default: 2000 bytesMaxOSPFLenSpecifies the maximum size of an OSPF packet. OSPF is a routing pro

Strany 246

1. Go to Objects > Address Book2. Click on the Add button3. In the dropdown menu displayed, select IP4 Address4. In the Name text box, enter myhost

Strany 247 - AH (Authentication Header)

13.8. Fragmentation SettingsIP is able to transport up to 65536 bytes of data. However, most media, such as Ethernet, cannotcarry such huge packets. T

Strany 248 - NAT Traversal Configuration

Default: Check8 – compare 8 random locations, a total of 32 bytesFragReassemblyFailReassemblies may fail due to one of the following causes:• Some of

Strany 249 - 9.3.6. Proposal Lists

not match up. Possible settings are as follows:• NoLog - No logging is carried out under normal circumstances.• LogSuspect - Logs duplicated fragments

Strany 250 - 9.3.7. Pre-shared Keys

Once a whole packet has been marked as illegal, NetDefendOS is able to retain this in its memory inorder to prevent further fragments of that packet f

Strany 251 - 9.3.8. Identification Lists

13.9. Local Fragment Reassembly SettingsLocalReass_MaxConcurrentMaximum number of concurrent local reassemblies.Default: 256LocalReass_MaxSizeMaximum

Strany 252

13.10. DHCP SettingsDHCP_MinimumLeaseTimeMinimum lease time (seconds) accepted from the DHCP server.Default: 60DHCP_ValidateBcastRequire that the assi

Strany 253 - 9.4.3. Roaming Clients

13.11. DHCPRelay SettingsDHCPRelay_MaxTransactionsMaximum number of transactions at the same time.Default: 32DHCPRelay_TransactionTimeoutFor how long

Strany 254

13.12. DHCPServer SettingsDHCPServer_SaveLeasePolicyWhat policy should be used to save the lease database to the disk, possible settings are Disabled,

Strany 255

13.13. IPsec SettingsIKESendInitialContactDetermines whether or not IKE should send the "Initial Contact" notification message. This message

Strany 256

IPsecDeleteSAOnIPValidationFailureControls what happens to the SAs if IP validation in Config Mode fails. If Enabled, the securityassociations (SAs) a

Strany 257 - 9.4.3.4. Using Config Mode

CLIgw-world:/> show -changesType Object------------- ------- IP4Address myhost* ServiceTCPUDP telnetA "+" character in front of the row i

Strany 258 - IP Validation

13.14. Logging SettingsLogSendPerSecLimitThis setting limits how many log packets NetDefendOS may send out per second. This value shouldnever be set t

Strany 259

13.15. Time Synchronization SettingsTimeSync_SyncIntervalSeconds between each resynchronization.Default: 86400TimeSync_MaxAdjustMaximum time drift tha

Strany 260 - 9.5. PPTP/L2TP

DST offset in minutes.Default: 0TimeSync_DSTStartDateWhat month and day DST starts, in the format MM-DD.Default: noneTimeSync_DSTEndDateWhat month and

Strany 261 - 9.5.2. L2TP

13.16. PPP SettingsPPP_L2TPBeforeRulesPass L2TP traffic sent to the D-Link Firewall directly to the L2TP Server without consulting therule set.Default

Strany 262 - 9.5.2. L2TP Chapter 9. VPN

13.17. Hardware Monitor SettingsHWM_PollIntervalPolling intervall for Hardware Monitor which is the delay in milliseconds between reading ofhardware m

Strany 263

13.18. Packet Re-assembly SettingsPacket re-assembly collects IP fragments into complete IP datagrams and, for TCP, reorderssegments so that they are

Strany 264

13.19. Miscellaneous SettingsBufFloodRebootTimeAs a final way out, NetDefendOS automatically reboots if its buffers have been flooded for a longtime.

Strany 265

MaxPipeUsers Chapter 13. Advanced Settings337

Strany 266

Appendix A. Subscribing to SecurityUpdatesIntroductionThe NetDefendOS Anti-Virus (AV) module, the Intrusion Detection and Prevention (IDP) moduleand t

Strany 267 - 10.1. Traffic Shaping

Querying Update StatusTo get the status of IDP updates use the command:gw-world:/> updatecenter -status IDPTo get the status of AV updates:gw-world

Strany 268 - Pipe Rules

NoteThe configuration must be committed before changes are saved. All changes to aconfiguration can be ignored simply by not committing a changed conf

Strany 269

Appendix B. IDP Signature GroupsFor IDP scanning, the following signature groups are available for selection. These groups areavailable only for the D

Strany 270

Group Name Intrusion TypeFTP_FORMATSTRING Format string attackFTP_GENERAL FTP protocol and implementationFTP_LOGIN Login attacksFTP_OVERFLOW FTP buffe

Strany 271

Group Name Intrusion TypePOP3_DOS Denial of Service for POPPOP3_GENERAL Post Office Protocol v3POP3_LOGIN-ATTACKS Password guessing and related login

Strany 272 - Pipe Precedences

Group Name Intrusion TypeTFTP_OPERATION Operation AttackTFTP_OVERFLOW TFTP buffer overflow attackTFTP_REPLY TFTP Reply attackTFTP_REQUEST TFTP request

Strany 273 - The Need for Guarantees

Appendix C. Checked MIME filetypesThe HTTP Application Layer Gateway has the ability to verify that the contents of a filedownloaded via the HTTP prot

Strany 274 - 10.1.7. Guarantees

Filetype extension Applicationelc eMacs Lisp Byte-compiled Source Codeemd ABT EMD Module/Song Format fileesp ESP archive dataexe Windows Executablefgf

Strany 275 - A Simple Groups Scenario

Filetype extension Applicationpac CrossePAC archive datapbf Portable Bitmap Format Imagepbm Portable Bitmap Graphicpdf Acrobat Portable Document Forma

Strany 276 - Relying on the group limit

Filetype extension Applicationwk Lotus 1-2-3 documentwmv Windows Media filewrl, vrml Plain Text VRML filexcf GIMP Image filexm Fast Tracker 2 Extended

Strany 277 - Troubleshooting

Appendix D. The OSI FrameworkThe Open Systems Interconnection Model defines a framework for intercomputer communications.It categorizes different prot

Strany 278

Appendix E. D-Link worldwide officesBelow is a complete list of D-Link worldwide sales offices. Please check your own country area'slocal website

Strany 279 - 10.2.4. Rule Actions

2.2. Events and Logging2.2.1. OverviewThe ability to log and analyze system activities is an essential feature of NetDefendOS. Loggingenables not only

Strany 280 - 10.2.6. Exempted Connections

FAX: +972-9-9715601. Website: www.dlink.co.ilItalyVia Nino Bonnet n. 6/b, 20154 – Milano, Italy. TEL:39-02-2900-0676, FAX: 39-02-2900-1723. Website: w

Strany 281 - 10.3.1. Overview

Alphabetical IndexAaccess rules, 135accounting, 39interim messages, 41limitations with NAT, 42messages, 39system shutdowns, 42address book, 48ethernet

Strany 282

DHCP_UseLinkLocalIP setting, 325DHCP_ValidateBcast setting, 325DHCPRelay_AutoSaveRelayInterval setting, 326DHCPRelay_MaxAutoRoutes setting, 326DHCPRel

Strany 283

LL2TP, 261quickstart guide, 234Lan to Lan tunnels, 253LayerSizeConsistency setting, 305LDAP servers, 259link state algorithm, 103LocalReass_MaxConcurr

Strany 284 - 10.3.6. SLB_SAT Rules

TCP and UDP, 53SilentlyDropStateICMPErrors setting, 311simple network management protocol (see SNMP)SIPALG, 152SMTPALG, 146header verification, 149SNM

Strany 285 - Example 10.3. Setting up SLB

X.509 certificates, 79identification lists, 251with IPsec, 234ZzonedefenseIDP, 194zone defense, 298switches, 299Alphabetical Index355

Strany 286

MemlogA D-Link Firewall has a built in logging mechanism known as the Memory Log. Thisretains all event log messages in memory and allows direct viewi

Strany 287

NoteThe syslog server may have to be configured to receive log messages fromNetDefendOS. Please see the documentation for your specific Syslog server

Strany 288

CLIgw-world:/> add LogReceiver EventReceiverSNMP2c my_snmp IPAddress=195.11.22.55Web Interface1. Goto Log & Event Receivers > Add > Event

Strany 289 - Chapter 11. High Availability

2.3. RADIUS Accounting2.3.1. OverviewWithin a network environment containing large numbers of users, it is advantageous to have one ora cluster of cen

Strany 290 - Extending Redundancy

Table of ContentsPreface ...121. Product O

Strany 291

database.• Delay Time - The time delay (in seconds) since the AccountingRequest packet was sent and theauthentication acknowledgement was received. Th

Strany 292

2.3.3. Interim Accounting MessagesIn addition to START and STOP messages NetDefendOS can optionally periodically send InterimAccounting Messages to up

Strany 293 - 11.3.1. Hardware Setup

• An AccountingStart event is sent to the inactive member in an HA setup whenever a responsehas been received from the accounting server. This specifi

Strany 294 - 11.3.2. NetDefendOS Setup

2.4. Monitoring2.4.1. SNMP MonitoringOverviewSimple Network Management Protocol (SNMP) is a standardized protocol for management ofnetwork devices. An

Strany 295

SNMP access. Port 161 is usually used for SNMP and NetDefendOS always expects SNMP trafficon that port.Remote Access EncryptionIt should be noted that

Strany 296 - Changing the Cluster ID

2.5. Maintenance2.5.1. Auto-Update MechanismA number of the NetDefendOS security features rely on external servers for automatic updates andcontent fi

Strany 297

Example 2.15. Complete Hardware Reset to Factory DefaultsCLIgw-world:/> reset -unitWeb Interface1. Go to Maintenance > Reset2. Select Restore th

Strany 298 - Chapter 12. ZoneDefense

2.5.3. Resetting to Factory Defaults Chapter 2. Management and Maintenance47

Strany 299 - 12.2. ZoneDefense Switches

Chapter 3. FundamentalsThis chapter describes the fundamental logical objects upon which NetDefendOS is built. Theseobjects include such things as add

Strany 300 - 12.3.2. Threshold Rules

For example: 192.168.0.0/24IP RangeA range of IP addresses is represented on the form a.b.c.d - e.f.g.h. Please note thatranges are not limited to net

Strany 301

3.4.3. ARP Cache ...683.4.4. Static and Published ARP Entries ...

Strany 302 - 12.3.4. Limitations

Web Interface1. Go to Objects > Address Book > Add > IP address2. Specify a suitable name for the IP Range, for instance wwwservers.3. Enter

Strany 303

3.1.4. Address GroupsAddress objects can be grouped in order to simplify configuration. Consider a number of publicservers that should be accessible f

Strany 304 - Chapter 13. Advanced Settings

3.2. Services3.2.1. OverviewA Service object is a reference to a specific IP protocol with associated parameters. A Servicedefinition is usually based

Strany 305

----------------- ----------------Name: echoDestinationPorts: 7Type: TCPUDP (TCP/UDP)SourcePorts: 0-65535PassICMPReturn: NoALG: (none)MaxSessions: 100

Strany 306

TipThe above methods of specifying port numbers are used not just for destination ports.Source port definitions can follow the same conventions, altho

Strany 307 - 13.2. TCP Level Settings

When setting up rules that filter by services it is possible to use the service grouping all_services torefer to all protocols. If just referring to t

Strany 308

number. Some of the common IP protocols, such as IGMP, are already pre-defined in theNetDefendOS system configuration.Similar to the TCP/UDP port rang

Strany 309

3.3. Interfaces3.3.1. OverviewAn Interface is one of the most important logical building blocks in NetDefendOS. All networktraffic that passes through

Strany 310 - TCPSequenceNumbers

L2TP tunnels. For more information about PPTP/L2TP,please see Section 9.5, “PPTP/L2TP”.• GRE interfaces are used to establish GRE tunnels. For moreinf

Strany 311 - SilentlyDropStateICMPErrors

The names of the Ethernet interfaces are pre-defined by the system, and are mapped to the names ofthe physical ports; a system with a wan port will ha

Strany 312 - 13.4. ARP Settings

6.2.8. H.323 ... 1556.3. Web Content Filtering ...

Strany 313

gw-world:/> set Interface Ethernet wan DHCPEnabled=YesWeb Interface1. Go to Interfaces > Ethernet2. In the grid, click on the ethernet object of

Strany 314

3. Assign a VLAN ID that is unique on the physical interface.4. Optionally specify an IP address for the VLAN.5. Optionally specify an IP broadcast ad

Strany 315

Control Protocols (NCPs) can be used to transport traffic for a particular protocol suite, so thatmultiple protocols can interoperate on the same link

Strany 316 - 13.6. Connection Timeouts

• Service Name: Service name provided by the service provider• Username: Username provided by the service provider• Password: Password provided by the

Strany 317 - Default: False

• IP Address - This is the IP address of the sending interface. This is optional and can be leftblank. If it is left blank then the sending IP address

Strany 318 - 13.7. Size Limits by Protocol

Setup for D-Link Firewall "A"Assuming that the network 192.168.10.0/24 is lannet on the lan interface, the steps for setting upNetDefendOS o

Strany 319

1. In the address book set up the following IP objects:• remote_net_A: 192.168.10.0/24• remote_gw: 172.16.0.1• ip_GRE: 192.168.0.22. Create a GRE Tunn

Strany 320 - DuplicateFragData

3. Click OK3.3.6. Interface Groups Chapter 3. Fundamentals67

Strany 321 - DuplicateFrags

3.4. ARP3.4.1. OverviewAddress Resolution Protocol (ARP) is a protocol, which maps a network layer protocol address to adata link layer hardware addre

Strany 322

The default expiration time for dynamic ARP entries is 900 seconds (15 minutes). This can bechanged by modifying the Advanced Setting ARPExpire. The s

Strany 323 - Default: 60 seconds

9.2.3. IPsec Roaming Clients with Certificates ... 2349.2.4. L2TP Roaming Clients with Pre-Shared Keys ...

Strany 324 - LocalReass_NumLarge

NetDefendOS supports defining static ARP entries (static binding of IP addresses to Ethernetaddresses) as well as publishing IP addresses with a speci

Strany 325 - DHCP_DisableArpOnOffer

There are two publishing modes; Publish and XPublish. The difference between the two is thatXPublish "lies" about the sender Ethernet addres

Strany 326 - 13.11. DHCPRelay Settings

situations are to be logged.Sender IP 0.0.0.0NetDefendOS can be configured on what to do with ARP queries that have a sender IP of 0.0.0.0.Such sender

Strany 327 - DHCPServer_SaveLeasePolicy

3.5. The IP Rule Set3.5.1. Security PoliciesPolicy CharacteristicsNetDefendOS Security Policies designed by the administrator, regulate the way in whi

Strany 328 - 13.13. IPsec Settings

IP RulesThe IP rule set is the most important of these security policy rule sets. It determines the criticalpacket filtering function of NetDefendOS,

Strany 329 - Default: Disabled

3.5.3. IP Rule ActionsA rule consists of two parts: the filtering parameters and the action to take if there is a match withthose parameters. As descr

Strany 330 - LogSendPerSecLimit

Using RejectIn certain situations the Reject action is recommended instead of the Drop action because a politereply is required from NetDefendOS. An e

Strany 331 - Default: 0

3.6. SchedulesIn some scenarios, it might be useful to control not only what functionality is enabled, but also whenthat functionality is being used.F

Strany 332 - TimeSync_DSTEndDate

• Action: NAT• Service: http• Schedule: OfficeHours• SourceInterface: lan• SourceNetwork lannet• DestinationInterface: any• DestinationNetwork: all-ne

Strany 333 - PPP_PPTPBeforeRules

3.7. X.509 CertificatesNetDefendOS supports digital certificates that comply with the ITU-T X.509 standard. Thisinvolves the use of an X.509 certifica

Strany 334

12.3.1. SNMP ... 30012.3.2. Threshold Rules ...

Strany 335 - Reassembly_MaxProcessingMem

has to be issued.Certificate Revocation ListsA Certificate Revocation List (CRL) contains a list of all certificates that have been cancelled beforeth

Strany 336 - MaxPipeUsers

3. Now select one of the following:• Upload self-signed X.509 Certificate• Upload a remote certificate4. Click OK and follow the instructions.Example

Strany 337

3.8. Setting Date and TimeCorrectly setting the date and time is important for NetDefendOS to operate properly. Timescheduled policies, auto-update of

Strany 338 - Pre-empting Database Updates

Example 3.21. Setting the Time ZoneTo modify the NetDefendOS time zone to be GMT plus 1 hour, follow the steps outlined below:CLIgw-world:/> set Da

Strany 339 - Deleting Local Databases

Time Synchronization Protocols are standardised methods for retrieving time information fromexternal Time Servers. NetDefendOS supports the following

Strany 340

CLIgw-world:/> time -syncAttempting to synchronize system time...Server time: 2007-02-27 12:21:52 (UTC+00:00)Local time: 2007-02-27 12:24:30 (UTC+0

Strany 341

D-Link Time ServersUsing D-Link's own Time Servers is an option in NetDefendOS and this is the recommended way ofsynchronizing the firewall clock

Strany 342

3.9. DNS LookupA DNS server can resolve a Fully Qualified Domain Name (FQDN) into the corresponding numericIP address. FQDNs are unambiguous textual d

Strany 343

3.9. DNS Lookup Chapter 3. Fundamentals88

Strany 344

Chapter 4. RoutingThis chapter describes how to configure IP routing in NetDefendOS.• Overview, page 89• Static Routing, page 90• Policy-based Routing

Strany 345

List of Figures1.1. Packet Flow Schematic Part I ...191.2. Packet Flow Schemat

Strany 346

4.2. Static RoutingThe most basic form of routing is known as Static Routing. The term static refers to the fact thatentries in the routing table are

Strany 347

4.2.2. Static RoutingThis section describes how routing is implemented in NetDefendOS, and how to configure staticrouting.NetDefendOS supports multipl

Strany 348 - Appendix D. The OSI Framework

Persistent Routes:NoneThe corresponding routing table in NetDefendOS is similar to this:Flags Network Iface Gateway Local IP Metric----- -------------

Strany 349

213.124.165.0/24 wan 00.0.0.0/0 wan 213.124.165.1 0Web InterfaceTo see the configured routing table:1. Go to Routing > Routing Tables2. Select and

Strany 350

Web Interface1. Select the Routes item in the Status dropdown menu in the menu bar2. Check the Show all routes checkbox and click the Apply button3. T

Strany 351 - Alphabetical Index

methods must be chosen:Interface Link StatusNetDefendOS will monitor the link status of the interfacespecified in the route. As long as the interface

Strany 352

automatically be transferred back to it.Route Interface GroupingWhen using route monitoring, it is important to check if a failover to another route w

Strany 353

IP address of host B on another separate network. The proxy ARP feature means that NetDefendOSresponds to this ARP request instead of host B. The NetD

Strany 354

4.3. Policy-based Routing4.3.1. OverviewPolicy-based Routing (PBR) is an extension to the standard routing described previously. It offersadministrato

Strany 355

Policy-based Routing rule can be triggered by the type of Service (HTTP for example) incombination with the Source/Destination Interface and Source/De

Komentáře k této Příručce

Žádné komentáře