Home

D-Link DFL-160 firewall (hardware)

image

Contents

1. Software Statistics SOMO E SiS s 193075 Sore Sene EA SOS CR SS DELS IR OEA ias 3 Hardware statistics IN packets 193074 bytes 36524718 errors 10 dropped 10 OUT packets 212646 bytes 208065794 errors 0 dropped 0 colllisicoas 0 a amp bengrca args 2 0 a 8 Oyezivuas E 151 CRM SO TA Frame Errors 0 a 2 JO Owsrreuas e 0 In Packets Missed 0 Out Sends Aborted 0 Owies Canaria Insewoirs s Oues MRO MU nc Era use Ours SOE Higicows s 0 Owes lieme Collaisiloas 105 Ikesnoop Appendix A CLI Reference The Dropped counter in the software section states the number of packets discarded as the result of structural integrity tests or rule set drops The IP Input Errs counter in the software section specifies the number of packets discarded due to checksum errors or IP headers broken beyond recognition The latter is most likely the result of local network problems rather than remote attacks Ikesnoop Ikesnoop is used to diagnose problems with IPsec tunnels Syntax ikesnoop Display current ikesnoop status Syntax ikesnoop off Turn IKE snooping off Syntax ikesnoop on ipaddr Turn IKE snooping on if an IP is specified then only IKE traffic from that IP will be shown Syntax ikesnoop verbose ipaddr Enable verbose output if an IP is specified then only IKE traffic from that IP will be shown IPsecstats Display connected I
2. 1 2 Ethernet Interfaces Chapter 1 Product Overview are intended for connection to local internal networks which will be protected from the outside internet by the highest security available from the DFL 160 Interfaces LAN to LAN4 are connected together via a switch fabric in the DFL 160 which means that traffic travelling between them will not be subject to the control of NetDefendOS All four are considered to be part of the single logical LAN interface This manual will refer to the LAN interface and by this will mean a connection to any of these 4 physical interfaces The management options for the LAN interface are described in Section 3 3 LAN Settings The DMZ interface This is for connection to a local network which will be the Demilitarized Zone DMZ A DMZ is usually set aside to contain computers that regularly receive data from and send data to the public internet An example might be a mail server The intent with the DMZ interface is to provide a stage of security between the well protected internal LAN networks and the public Internet which is connected to the WAN interface If desired the DMZ can be used like another LAN interface but does not share the common LAN switch fabric mentioned above The management options for the DMZ interface are described in Section 3 4 DMZ Settings e The WAN interface This is intended for connection to an external network In most cases this interface will be
3. Traffic must be able to flow between the designated PC Ethernet interface and the DFL 160 LAN interface so they must be on the same IP network This means the PC s interface should be assigned the following static IP addresses IP address 192 168 10 30 Subnet mask 255 255 255 0 Default gateway 792 168 10 1 To configure these settings on a Windows XP system perform the following steps 1 Ze Click the Windows Start button Right click on My Network Places and select Properties a My Network Places Right click the chosen Ethernet interface and select Properties Select Internet Protocol TCP IP and click Properties 4 Local Area Connection 2 Properties PR General Advanced Connect using BB Broadcom NetXtreme Gigabit Etheme This connection uses the following items Wi ll Client for Microsoft Networks El 00s Packet Scheduler v r File and Printer Sharing for Microsoft Networks Internet Protocol TCP IP Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Notify me when this connection has limited or no connectivity Enter the IP addresses given above and click OK 114 Appendix B Windows IP Setup Internet Protocol TCP IP Properties General You can get IP settings assigned auto
4. COMBS 717 AMBBGTER CI OEA REA CURA LBRGEESSMRIOTFILBHVIEF COR ANCIMERADRAAR VCCI B ZETO LIER ENDT LDH ET Battery Caution CAUTION Risk of Explosion if Battery is replaced by an Incorrect Type Dispose of Used Batteries According to the Instructions Caution This product is intended for placement on a table or another flat surface and is not intended to be mounted on a wall
5. Category 22 Clubs and Societies A web site may be classified under the Clubs and Societies category if its content includes information or services of relating to a club or society This includes team or conference web sites Examples might be e WWW sierra org e www walkingclub org Category 23 Music Downloads 58 4 6 2 The Content Categories Chapter 4 The Firewall Menu A web site may be classified under the Music Downloads category if it provides online music downloading uploading and sharing facilities as well as high bandwidth audio streaming Examples might be e www onlymp3s com e www mp3space com Category 24 Business Oriented A web site may be classified under the Business Oriented category if its content is relevant to general day to day business or proper functioning of the Internet for example Web browser updates Access to web sites in this category would in most cases not be considered unproductive or inappropriate Category 25 Government Blocking List This category is populated by URLs specified by a government agency and contains URLs that are deemed unsuitable for viewing by the general public by way of their very extreme nature Examples might be e www verynastystuff com e www unpleasantvids com Category 26 Educational A web site classified under the Educational category may belong to other categories but has content that relates to educational services or has been deemed of educationa
6. Example DFL 160 gt updatecenter status Antivirus Signature Database Database Version 2 2008 01 22 15 02 27 HW Support 1c2350a Hardware DB Version Latest Full 2008 01 22 15 02 27 Patch N A Status Update server available Next update scheduled for 2008 01 25 05 11 00 IDP Signature Database 111 Urlcache Appendix A CLI Reference Database Version 2 2006 10 04 10 13 18 HW Support 1c2350a Hardware DB Version Latest Full 2006 10 04 10 13 18 Patch N A Status Update server available Next update scheduled for 2008 01 25 05 11 00 Urlcache Displays information related to the URL cache used by the Web Content Filtering function Syntax urlcache options Options v Verbose option to list all information c Display the cache count hash Display information regarding the hashing num lt value gt List lt value gt entries in the cache serverstatus Web Content Filtering server status connectserver Connect to the Web Content Filtering Server Provides a way to check connection disconnectserver Disconnect from the Web Content Filtering server provides a way to explicitly disconnect Userauth Display information about authenticated users known privileges Syntax userauth options Options l Displays a list of all authenticated users p Displays a list of all known privileges usernames and groups r lt ip gt Removes an authenticated user logout
7. 11 0 24 network However the DMZ interface can t be used for initial connection with a browser because it is not enabled as a management interface Management access through the DMZ interface can be enabled after initial management connection through the LAN interface Going Further At this point the DFL 160 product should be operational and acting as a secure barrier between internal networks and the public Internet The next step for the administrator is to further explore the 16 2 2 Web Browser Connection Chapter 2 Initial Setup features of the product and bring into use those which meet the needs of a particular installation It is recommended that adminstrators familiarize themselves with the web interface by clicking on the main menu options and exploring the individual options available with each The later part of this manual has a structure which reflects the naming and order of these menu options In most instances the web interface provides a helpful text description on the right hand side for how features are used as well as more detailed descriptions for individual fields and options 17 2 3 Browser Connection Chapter 2 Initial Setup Troubleshooting 2 3 Browser Connection Troubleshooting If the management interface does not respond after the DFL 160 has powered up and NetDefendOS has started there are a number of simple steps to trouble shoot basic connection problems 1 Check that the LAN interfa
8. 92 environmental parameters 12 Ethernet port LEDs 9 F FireFox usage 14 firewall menu 16 39 frags CLI command 104 H heat flow considerations 12 httpposter CLI command 37 104 l IDP options 64 status 78 ifstat CLI command 105 ikesnoop CLI command 106 inbound connections 16 inbound traffic options 44 interfaces 7 interfaces status 80 internet connection 25 Internet Explorer usage 14 intrusion detection and prevention see IDP IPsec 47 82 ipsecstats CLI command 106 ipsectunnels CLI command 106 K killsa CLI command 106 L L2TP client 49 server 50 LAN interface 7 27 LAN settings 27 LED indicators 9 license CLI command 107 licenses 89 location for hardware 11 lockdown CLI command 107 logging 33 status 75 logging in as administrator 14 logging out 15 automatic 15 logout CLI command 107 maintenance menu 87 memory CLI command 107 MTU setting 25 O operating parameters 12 outbound connections 16 outbound DMZ traffic options 42 outbound LAN traffic options 40 120 Alphabetical Index P phishing see content filtering ping 70 ping CLI command 70 107 power LED 9 PPTP client 49 server 50 pre shared key with IPsec 48 product support 118 R reconfigure CLI command 108 reset to factory defaults 92 restoring a backup 91 routes 84 metrics 84 routes CLI command 108 rules CLI command 109 S schedules 67 with inb
9. Default IP addresses are already entered but these probably need to be changed The IP address entered would be a private IP address of the internal host if NAT is being used or a public IP address if it is not If there are two IP addresses for a particular service for instance 2 web servers then the inbound traffic to one could be allowed by ticking the box here and the inbound traffic to the other could be allowed by creating a Custom Traffic rule as described below If NAT is being used then the port numbers for each server must be different otherwise NAT cannot function Important 0 Note that if HTTP or HTTPS is allowed then management access that uses the same protocol must have the default port number changed This is explained more fully in Section 3 1 Administration A named Schedule can be defined and then associated with any protocol for inbound traffic Schedules specify times when a particular protocol is allowed Schedules can also be defined for outbound traffic protocols More details can be found in Section 4 9 Schedules B Inbound Multicast Multicast is an IP networking technique that allows a single host to broadcast messages to multiple receiving clients If such inbound traffic is allowed then the allowed IP address range can also be specified Multimedia applications sometimes make use of multicast and the administrator should check with the needs of internal users to determine if this option should
10. IP addresses can be allocated which can then be allocated out to hosts on the network that need them The presentation of the DHCP server options in the web interface is shown below Enable DHCP Server DHCP IP Address Range to Addresses within the LAN subnet DHCP Lease Time 1440 minutes In most scenarios the LAN network will be an internal network that does not require public IP addresses However if a range of public IP addresses are allocated by the ISP these could also be allocated using this feature NetDefendOS also allows a DHCP Reservations list to be created These bind a certain IP address 28 3 3 LAN Settings Chapter 3 The System Menu with a particular MAC address When a request for a DHCP lease is received on the interface NetDefendOS checks the MAC address of the requesting DHCP client against the list If a match is found the IP address that has been associated with the MAC address is the one that is handed out The screenshot below shows how this option appears in the web interface Combinations of IP address and MAC address can be added to the list The red icon on the right of each entry can be clicked to delete the entry IP Address Host s IP address MAC Address Ethernet MAC address e g 12 34 56 78 ab cd 1P Address MAC Address 192 168 10 110 00 10 48 99 04 83 192 168 10 111 00 10 4B 99 26 A0 192 168 10 112 00 02 E3 55 27 4B This feature allows the same IP address to be always
11. Minimum Number of Protocols It is recommended to scan the minimum number of protocols required For example if there is only an SMTP server in the DMZ network then enabling the SMTP checkbox only is recommended IDP scanning can consume the processing resources of the DFL 160 and it is therefore best to keep the scanning requested to a minimum The Scanners Category The Scanners IDP category is not protocol specific and is an additional precaution against attempted connections coming from the public Internet which randomly search for hosts that will respond Often these try and make connections on different port numbers that might allow access to a host The Worms and Malware Category 65 4 8 IDP Options Chapter 4 The Firewall Menu This category is similar to Scanners in that it is not protocol specific but provides an additional catch all protection against intrusion attempts that are not specific to a particular protocol With both Worms and Malware and Scanners it is important to use them with caution since they will use more processing resources by increasing the scanning load Both can be particularly useful when used for periods of time in log only mode to determine if IDP is indicating that a DFL 160 installation is being targeted by external intrusions 66 4 9 Schedules Chapter 4 The Firewall Menu 4 9 Schedules Schedules are used to determine when certain features in NetDefendOS are enabled For insta
12. Routes od 84 6 11 DHCP Server Status ias traida ra EINAR ei 85 i The Maintenance Medi e Canoe 87 TA The Update Center estante cirio cias EE mitad 87 T2 o O ae A E ees it voce eobaus EEOSE ES 89 TS Backups SO E ER IE ii ias 91 TA Reset to Factory Defaults versions ia sr iria titanic 92 TI SU PStades ii A A o A cate 93 6 Technical Support vesioto alas a doe sp aan cri th oth Suto dl eee tra sep 94 8 The Console Boot Menu rasce erneierter eie n E e i e a r a E 96 9 FroubleshoOtn EN 98 A cCLURETErEnCe id ek eens cei eee EL I id Dies 100 B Windows IP SetU p nie r eere feciesas oshoteh ssa vests E EEEE NEE vs yetaadssaasges se biesa poets 114 User Manual Apple Mac IP Setup cnica toi a dais age ds 116 D D Link Worldwide Offices 55 6 desi dec gti e a s douse ounl sede veneebeyeel iss dies 118 Alphabetical Index is As 120 Chapter 1 Product Overview e The DFL 160 Solution page 5 e Ethernet Interfaces page 7 e The LED Indicators page 9 1 1 The DFL 160 Solution The NetDefend SOHO UTM product is a D Link hardware software solution designed for situations where a conventional IP router connected to the public Internet in a small organization or home environment does not have sufficient capabilities to provide the network security required to combat today s universe of potential external threats The DFL 160 and the NetDefendOS Software The term DFL 160 refers to the physical hardware that is pro
13. Status Menu 6 2 Logging Status Various events that occur in NetDefendOS cause log messages to created All possible log messages generated are documented in the accompanying DFL 160 Log Message Reference Guide An external SysLog server can be configured to receive these events as described in Section 3 5 Logging That section also describes setting up email alerts for certain events As events occur the last 500 log general messages are kept in local memory and this store is known as the NetDefendOS MemLog Along with these 500 the last 500 from each of the Anti Virus Web Content Filtering and IDP subsystems are also kept in memory and these can be viewed separately The MemLog Display The most recent 500 log messages from all sources including AV WCF and IDP can be viewed through the Logging page of the Status menu Log messages are visible in 100 message blocks on the page and tools are also provided for filtering out messages of interest based on various criteria The dialog for entering the search crieria are shown below From To Tm LT Source Destination Interface IP Address Port Event Action Severity Any Category Any v Free Text J Some typical log output for the Anti Virus subsystem is shown below Date Severity Category ID Rule Proto Src Dstif Src DstiP Src DstPort Event Action 2008 10 30 A ANTIVIRUS lan 10 10 10 10 3229 virus_fou
14. TEL 41 0 1 832 11 00 FAX 41 0 1 832 11 01 Website www dlink ch No 289 Sinhu 3rd Rd Neihu District Taipei City 114 Taiwan TEL 886 2 6600 0123 FAX 886 2 6600 1188 Website www dlinktw com tw Cetin Emec Bulvari 74 sokak ABC Plaza No 9 3 Ovecler Ankara TURKEY TEL 0090 312 473 40 55 FAX 0090 312 473 40 58 Website www dlink com tr 17595 Mt Herrmann Street Fountain Valley CA 92708 TEL 1 800 326 1688 Website www dlink com 119 Alphabetical Index A about CLI command 100 administration 22 username 23 anti virus 61 status 76 apple MAC IP setup 116 arp CLI command 100 arpsnoop CLI command 100 audit username 23 automatic logout 15 backups 91 boot menu 19 96 browser connection 13 buffers CLI command 101 C certificate based IPsec 48 cfglog CLI command 102 CLI command reference 100 connecting cables 13 connecting power 13 connections CLI command 102 connections status 79 console output truncation 19 port connection 19 console boot menu see boot menu console commands see CLI content filtering phishing 58 spam 60 contents delivered 11 crashdump CLI command 102 D date and time options 35 dconsole CLI command 98 103 dhcp CLI command 103 dhcpserver CLI command 103 DHCP server status 85 dial on demand 25 26 49 DMZ interface 7 30 DMZ settings 30 dns CLI command 103 dynamic DNS settings 37 E end of life procedures
15. allocated to a particular DHCP client Transparent Mode and the Interface IP Address There are some considerations that should be noted with the LAN IP address when transparent mode is enabled e In transparent mode the LAN interface will take on the same IP address as the WAN interface If DHCP is enabled on the WAN interface and the IP address on WAN cannot be refreshed within its DHCP lease time then it will receive the IP address 0 0 0 0 and the LAN interface will also receive this IP address This will mean that it will not be possible for the administrator to connect through the LAN interface with a browser to perform management tasks while the LAN interface has the 0 0 0 0 IP address These IP address considerations are also true if transparent mode is enabled on the DMZ interface 29 3 4 DMZ Settings Chapter 3 The System Menu 3 4 DMZ Settings The settings in this part of the management web interface determine how the DFL 160 s DMZ interface operates These settings are very similar to the corresponding page for the LAN interface see Section 3 3 LAN Settings DMZ Interface Options There are three sections on this page of the web interface A DMZ Interface Settings B Mode C DHCP Server Settings A DMZ Interface Settings The IP address of the DMZ interface is allocated here for NAT and Routing mode Transparent mode does not require an IP address to be allocated Instead the LAN interface
16. are using a VPN tunnel An example of the user authentication display is shown below Username IP Address Interface Timeout Idle Timeout Logged in as Forcbly Log Out 192 165 1 151 RemoteUsers_WinXP 192 168 1 150 RemoteUsers_WinXP The Forcibly Logout Option For each user the administrator has the option to force a logout of a user with this option This can be useful if suspicious activity is seen coming from a particular logged in user 83 6 10 Routes Chapter 6 The Status Menu 6 10 Routes A Brief Overview of Routing A list of all routes are maintained by NetDefendOS in its internal routing table The routing table indicates which networks can be found on which interface When traffic arrives at the DFL 160 on one interface the routing table is consulted by NetDefendOS to determine on which interface the traffic should be forwarded so it gets to its intended destination When the routing table is consulted the route chosen is the one that has the narrowest match to the destination IP address being looked up this is explained further below The traffic forwarding function performed with the help of the routing table is the primary task of any device which is called a router It is also one of the primary tasks of the DFL 160 and in most cases the routes in the NetDefendOS routing table are created automatically without intervention from the administrator The image below shows a typical example of the status displa
17. console to the console port This port is marked COM as shown in the image above The connected console must have the following communication settings e 9600 bps e No parity e 8 bits e 1 stop bit e No flow control Entering the Boot Menu The Boot Menu is another feature that can only be accessed through the console It is a direct management interface to the DFL 160 s firmware loader software which underlies the NetDefendOS software It allows the administrator to reset the DFL 160 unit as well as set a console password The boot menu is entered by pressing any console key between power up and NetDefendOS starting The console will display the message Press any key to abort and load boot menu during this interval This feature is described further in Chapter 8 The Console Boot Menu Console Output Truncation The only limitation with issuing CLI commands through the serial console is that there is a finite 19 2 4 Console Port Connection Chapter 2 Initial Setup buffer allocated for output This buffer limit means that a single large volume of console output may be truncated This happens rarely and only with certain commands The DFL 160 USB Port Next to the RS232 port is a USB port This port is not used with the current version of NetDefendOS The port is intended for use with features planned for future NetDefendOS versions and is provided so that no hardware upgrade will be required in order to make use of
18. lt options gt lt range gt Options schedule Filter out rules that are not currently allowed by selected schedules type Type of rules to display verbose show all parameters of the rules The range parameter specifies which rules to include in the output of this command Settings Shows the contents of the Settings configuration section Syntax settings Shows available groups of settings Example DFL 160 gt sett Available categories in the Settings section IP IP Internet Protocol Settings KOR TCP Transmission Control Protocol Settings ICMP ICMP Internet Control Message Protocol Settings ARP ARP Address Resolution Protocol Settings State Stateful Inspection Settings ConnTimeouts Default Connection timeouts LengthLim Dereulle Lengen Limics on SHom Wricercoe oils Frag Fragmentation Settings VLAN VLAN Settings SNMP SNMP Settings DHCP DHCP Dynamic Host Configuration Protocol Settings Log Log Settings Misc Miscellaneous Settings Syntax settings lt group_name gt Shows the settings of the specified group Example DFL 160 gt settings arp ARP Address Resolution Protocol Settings ARPMatchEnetSender DropLog ARPQueryNoSenderIP Drop ROG ARPSenderIP Validate UnsolicitedARPReplies DropLog ARPRequests DROP ARPChanges AcceptLog StaticARPChanges IDOLOS ARPExpire 3 900 109 Shutdown Appendix A CLI Refe
19. modem and the relevant third party modem documentation should be consulted in order to have this link operational The possible connection protocol options are A DHCP Setup B Static Connection C PPPoE Connection D PPTP Connection A DHCP Setup The DHCP protocol is a means for a network device such as the DFL 160 to retrieve all required IP addresses automatically from a DHCP server In this case the ISP provides the IP addresses from 1ts DHCP server provided that the Ethernet connection to the ISP is functioning All required IP addresses will automatically be retrieved and no further configuration is normally required for this option The only option is the MTU value that will be used for this connection but this normally doesn t need to be changed MTU Should normally not be changed The MTU value appears as an option in all the different types of Internet connections described below The MTU value effects the level of packet fragmentation in connections to the ISP A lower MTU value increases fragmentation with a resulting increase in processing overhead to re assemble the packets The default MTU value is 7500 B Static Connection With this option the IP addresses required for the internet connection are entered manually Your ISP should provide all the information needed for this option All fields need to be entered except for the Secondary DNS server field C PPPoE Connection With this option the username a
20. standard that is widely used for sending messages to a separate Syslog Server NetDefendOS supports this standard and up to two syslog servers can be configured to receive messages from NetDefendOS by specifying their IP addresses The Syslog Facility is a way of marking syslog messages with a specific source identifier For instance one DFL 160 might be given the syslog facility local0 while a second might be locall When messages are sent to the same syslog server the messages from one unit can be distinguished from the messages of the other unit B Audit Logging When data connections are opened and closed these events are not normally part of the log 33 3 5 Logging Chapter 3 The System Menu messages generated by NetDefendOS By enabling this option these log messages will be included C Email Alerts NetDefendOS can be configured to send emails to up to three email addresses when log messages are generated that are equal to or exceed a defined threshold This threshold is referred to as the sensitivity The sensitivity settings translate into the following values e Very High Min Repeat Delay 600 seconds Hold Time 20 Log Threshold 0 High Min Repeat Delay 600 seconds Hold Time 720 Log Threshold 2 e Medium Min Repeat Delay 600 seconds Hold Time 720 Log Threshold 3 Low Min Repeat Delay 1800 seconds Hold Time 720 Log Threshold 5 e Very Low Min Repeat Delay 3600 seconds Hold Time
21. 00 Brussels Belgium TEL 32 0 2 517 7111 FAX 32 0 2 517 6500 Website www dlink be P O Box 500376 Office 103 Building 3 Dubai Internet City Dubai United Arab Emirates Tel 971 4 3916480 Fax 971 4 3908881 Website www dlink me com Weena 290 3012 NJ Rotterdam Netherlands Tel 31 10 282 1445 Fax 31 10 282 1331 Website www dlink nl Karihaugveien 89 N 1086 Oslo Norway TEL 47 99 300 100 FAX 47 22 30 95 80 Website www dlink no Budynek Aurum ul Walic w 11 PL 00 851 Warszawa Poland TEL 48 0 22 583 92 75 FAX 48 0 22 583 92 76 Website www dlink pl Rua Fernando Pahla 50 Edificio Simol 1900 Lisbon Portugal TEL 351 21 8688493 Website www dlink es Grafsky per 14 floor 6 Moscow 129626 Russia TEL 7 495 744 0099 FAX 7 495 744 0099 350 Website www dlink ru 1 International Business Park 03 12 The Synergy Singapore 609917 TEL 65 6774 6233 FAX 65 6774 6322 Website www dlink intl com Einstein Park II Block B 102 106 Witch Hazel Avenue Highveld Technopark Centurion Gauteng Republic of South Africa TEL 27 12 665 2165 FAX 27 12 665 2186 Website www d link co za Avenida Diagonal 593 95 9th floor 08014 Barcelona Spain TEL 34 93 4090770 FAX 34 93 4910795 Website www dlink es P O Box 15036 S 167 15 Bromma Sweden TEL 46 0 8564 61900 FAX 46 0 8564 61901 Website www dlink se Glatt Tower 2 0G CH 8301 Glattzentrum Postfach 2 0G Switzerland
22. 00700 HELSINKI Finland TEL 358 10 309 8840 FAX 358 10 309 8841 Website www dlink fi No 2 Allee de la Fresnerie 78330 Fontenay le Fleury France TEL 33 1 30238688 FAX 33 1 30238689 Website www dlink fr Schwalbacher Strasse 74 D 65760 Eschborn Germany TEL 49 6196 77990 FAX 49 6196 7799300 Website www dlink de 101 Panagoulis Str 163 43 Helioupolis Athens Greece TEL 30 210 9914 512 FAX 30 210 9916902 Website www dlink gr R k czi t 70 72 HU 1074 Budapest Hungary TEL 36 0 1 461 30 00 FAX 36 0 1 461 30 09 Website www dlink hu D Link House Kurla Bandra Complex Road Off CST Road Santacruz East Mumbai 400098 India TEL 91 022 26526696 56902210 FAX 91 022 26528914 Website www dlink co in 11 Hamanofim Street Ackerstein Towers Regus Business Center P O B 2148 Hertzelia Pituach 46120 Israel TEL 972 9 9715700 FAX 972 9 9715601 Website www dlink co il 118 Appendix D D Link Worldwide Offices Italy LatinAmerica Luxemburg Middle East Dubai Netherlands Norway Poland Portugal Russia Singapore South Africa Spain Sweden Switzerland Taiwan Turkey U S A Via Nino Bonnet n 6 b 20154 Milano Italy TEL 39 02 2900 0676 FAX 39 02 2900 1723 Website www dlink it Isidora Goyeechea 2934 Ofcina 702 Las Condes Santiago Chile TEL 56 2 232 3185 FAX 56 2 232 0923 Website www dlink cl Rue des Colonies 11 B 10
23. 008 10 30 00 23 32 changes Configuration Log Error s 0 Warning s 0 2 Connections Memory Usage 21 ___ INEA 78 128M8 __ rT TE 269 12000 MOTION MO MO MO O IN O IN o 30 MA B UTM Statistics Unified Threat Management UTM consists of the 3 components Anti Virus IDP and Web Content Filtering If any of these features are enabled this section gives an overview of the throughput statistics for the features The configuration options for setting up the different aspects of UTM can be found in Chapter 4 The Firewall Menu C Log History This table shows the last few log events generated by NetDefendOS an example of this is shown below 73 6 1 System Status Chapter 6 The Status Menu 2008 10 27 14 01 49 2008 10 27 14 01 49 2008 10 27 14 01 48 2008 10 27 14 01 48 2008 10 27 14 01 48 Severity Warning Warning Notice Notice Warning Category ID ARP 300049 ARP 300049 SYSTEM 3203000 SESMGR 4900001 ARP 300049 Event Action invalid_arp_sender_ip_address drop invalid_arp_sender_ip_address drop admin_login sesmgr_session_created none invalid_arp_sender_ip_address drop Clicking the More link in the display will take you to the Logging option in the System menu for a more complete list of recent events and the filters to analyze them The details of NetDefendOS logging can be found in Section 3 5 Logging 74 6 2 Logging Status Chapter 6 The
24. 1048560 bytes 003 04 24 00 03 46 Available UserPoolMemory 198868948 bytes 003 04 24 00 03 46 Drive 0x00 present C H S SC M 0x50 0x2 0x12 0x24 0xb3f 003 04 24 00 03 46 Drive 0x80 present C H S SC M 0x3 2 0x10 0x33 0x330 0xc935f 003 04 24 00 03 46 Drive 0x80 is using a FAT 16 filesystem 2 2 2 2 2 2003 04 24 0 03 46 Firewall loader up and running Techsupport Time Displays extensive system information that can be used for trouble shooting This information is designed to be sent to technical support for problem diagnosis This command s output is actually a concatenation of the output from several other commands Syntax techsupport Displays the system date and time Syntax time lt options gt Options set lt arg gt Set system local time Y Y Y Y MM DD HH MM SS sync Synchronize time with timeserver s specified in settings force Force synchronization regardless of the MaxAdjust setting Uarules Shows configured user authentication rules Syntax uarules Updatecenter Displays Anti Virus IDP version and update information Syntax updatecenter options Options update avlidp force a database update now status avlidp show update status removedb avlidp delete the specified database servers show information about autoupdate servers debugtestidp invokes IDP test code CAUTION this sometimes may cause the hardware to freeze
25. 2 cora 10 6 0 17 80 FIN_RCVD TCP lan 192 168 1 100 1140 core 10 6 0 17 80 TCP_OPEN TCP core 10 6 28 160 2009 wan 10 6 0 17 80 262142 TCP_OPEN TCP lan 192 168 1 100 1143 core 10 6 0 17 80 262142 TCP_OPEN TCP core 10 6 28 160 13116 wan 10 6 0 17 80 262142 TCP_OPEN TCP lan 192 168 1 100 1144 core 10 6 0 17 80 262142 TCP_OPEN TCP lan 192 168 1 11 2458 core 192 168 1 1 443 262144 Where the source of destination address is marked as core this means that it is NetDefendOS itself that is dealing with the connection The ability to filter the connections is possible based on specific combinations of source destination IP address interface FILTER STATE TABLE DISPLAY Source Destination IP Address Interface IP Protocol Port 79 6 7 Interfaces Status Chapter 6 The Status Menu 6 7 Interfaces Status This option can show the current status for each of the DFL 160 interfaces When one of the interfaces is selected from a drop down box in this page information about the interface s status is displayed both in numerical and graphical form The sections displayed for the chosen interface are A Interface Status B Driver Information Hardware Statistics C Throughput Statistics A Interface Status The general information for the chosen interface is displayed The example below is for the DMZ interface Interface dmz M IP Address 192 168 2 1 Link Status 100 Mbps Full Duplex MAC Address 00 e0 4c 69 21 5 Sen
26. 20 Log Threshold 0 The Log Threshold indicates the threshold severity for the log message generated Every log message has a severity value that ranges from zero the most severe to 10 the least severe An SMTP server should be specified that will be used to send the email messages The SMTP server MUST be specified using an IP address and cannot be specified using a domain name such as dns smtp domain com 34 3 6 Date and Time Chapter 3 The System Menu 3 6 Date and Time A variety of NetDefendOS functions depend on the system date and time being set correctly for the DFL 160 It is therefore recommended to set the correct time and date as soon as possible There are three time and date options A General B Time zone and daylight saving time settings C Automatic time synchronization A General The Set Date and Time button allows the current management workstation s computer s date and time to be used as the DFL 160 s date and time B Time zone and daylight saving time settings The applicable time zone and applicable daylight saving time settings can be set in this part of the web page Enable daylight saving time C Automatic time synchronization A number of publicly available time servers exist on the Internet which any host can query to get the current time and date These can be used to automatically check and adjust the DFL 160 system clock NetDefendOS can make use of one of two types of time serve
27. 74971 a0debb72c bfaae832 db216923 08ba693b 95e4de97 98d121a2 98 Chapter 9 Troubleshooting Although dconsole output may be difficult to interpret by the administrator it can be emailed to D Link support representatives for further investigation The dconsole command supersedes the crashdump command found in earlier versions of NetDefendOS Restarting If a system is in a non functional frozen state then system restart can offer a simple way to clear all error conditions This can take a few minutes and while restart occurs no traffic can flow through the unit All connections will be lost including any VPN tunnels and these will have to be re established after restart Restarting can be regarded as a last resort when dealing with system problems but is perhaps the only solution when all other methods of troubleshooting are exhausted 99 Appendix A CLI Reference This section summarizes in alphabetical order the command set that can be entered through a console connected to the RS232 console port on the DFL 160 Details of how to connect up a console device to the console COM port on the DFL 160 can be found in Section 2 4 Console Port Connection Once the connection is made and NetDefendOS has started up pressing the Enter key on the console should get a CLI prompt response on the console DFL 160 gt It is advisable to use the Boot Menu to place a password on access through the console port to preven
28. 98 3 2 10 Number of Packets 1 Packet Size Pinging 198 3 2 10 with 32 bytes of data The response from a ping is expressed as the percentage of packet loss Packet loss is 100 if no response is received as shown below 1 packets transmitted O packets received 100 packet loss Round trip time average O ms In the case of NetDefendOS a response to a ping request on a particular interface depends on if the administrator has enabled ping responses or not This is discussed further in Section 3 1 Administration Initiating Ping Requests from the CLI An alternative method of issuing ping requests is to use the CLI ping command This command is described in Appendix A CLI Reference 70 5 1 Ping Chapter 5 The Tools Menu 71 Chapter 6 The Status Menu e System Status page 73 e Logging Status page 75 e Anti Virus Status page 76 e Web Content Filtering Status page 77 e IDP Status page 78 e Connections Status page 79 e Interfaces Status page 80 e IPsec Status page 82 e User Authentication Status page 83 e Routes page 84 e DHCP Server Status page 85 7 The Status menu of the DFL 160 web interface provides various views of the current status performance and loading of the various subsystems that make up NetDefendOS ADMINISTRATION INTERNET CONNECTION LAN SETTINGS TTINGS DATE AND TIME DYNAMIC DNS SETTINGS Filtering Output Where the status out
29. EDE SS 10 532 ICME 130 GO HTTPPoster Show the configured httpposter urls and status Syntax httpposter options Options repost Re post all URLs now Example DFL 160 gt httpposter HTTPPoster_URL1 lOs GWM Por 0 Pat wee POS Use PASE g Wy Status not configured CASAR Ear Ge HTTPPoster_URL2 Hos wee Por 0 Pat wee POS Use z ASS Stats MOC COME LOVEC ar ar A K 104 lfStat Appendix A CLI Reference HTTPPoster_URL3 Hos wee Plone Ram Pos A USE ESSE Status not configured 0 A Gt IfStat Syntax ifstat Shows a list of the interfaces installed Example DFL 160 gt ifstat Configured interfaces Iface IP Address PBR membership Interface type core A AO lt all gt Null sink meme IO 9 0 36 lt all gt Su licaa SiLOO metele S255 5 wan IPA LO BT 5252 lt ai gt BULlEM e100 Intel R 8255 0 lan TOZ SS Z lt aulli lu licita GIO Iaeel 8 0259 o poco LOs 10240 131 lt elil gt PS iwi To 192 168 235 il Syntax ifstat lt interface gt Shows hardware and software statistics for the specified NIC Example DFL 160 gt ifstat lan Iface lan BLANCOS ESA E PRO L000 r Server Adapter S lO 002 41 OS Media 1000BaseTx Speed 1000 Mbps Full Duplex MAIS O biak Parcher E 10BASE T 10BASE T FD 100BASE TX 100BASE TX FD 1000BASE TIX F Bus Type PCI 64 bit 33MHz 1 Welcbease 192 168 123 1 Hw Address 00 03 47 ab ea 25
30. ER COMMERCIAL DAMAGES OR LOSSES RESULTING FROM THE APPLICATION OR IMPROPER USE OF THE D LINK PRODUCT OR FAILURE OF THE PRODUCT EVEN IF D LINK IS INFORMED OF THE POSSIBILITY OF SUCH DAMAGES FURTHERMORE D LINK WILL NOT BE LIABLE FOR THIRD PARTY CLAIMS AGAINST CUSTOMER FOR LOSSES OR DAMAGES D LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT D LINK RECEIVED FROM THE END USER FOR THE PRODUCT Table of Contents Tl Product OVEPVIEW ia 5 1 1 The DEL 160 Solution tesi diran usas tati a Aita 5 1 2 Ethernet interactions 7 1 3 The LED Indicators ia eae De eee 9 2 Initial SCUIp yeee ereo ea ree e EEE nea see ee Sunes seated EEEE EEE OTE ENE EErEE 11 251 Unpacking yera A a ey 11 2 2 Web Browser CONNECHOM miosina e 13 2 3 Browser Connection Troubleshooting ooccooccnccnncnnccnnccnnccnnconnconnconnconncnnncos 18 2 4 Console Port CONMECHON oeie ieena RE cases aE E AE OI ERRES INR ia Paia 19 3 The System Menu ission ea O e E A EEEE Ea T S 22 SA Administrati n sic tri ria A e E OE E TEA 22 3 2 Internet Connect n si iann nne eE E EE S REEE TAES REE 25 3 3 JEAN Stun gS eren tasna OP EREE OSES REA vs ERE IOS ak tobias estes 27 JA PMA SeA A a e a e RE EASE 30 SILO A S S 33 3 0 Date and TMe reis dt n E AE AEE Counce aed E EEAS S 35 3 7 Dynamic DNS Settings eiee i e E E E EEE E E TER SEA 37 4 The Firewall Ment ii day E A a N a desta 39 4 1 Outbound LAN Traffic Options esseeessseesseesr
31. Example DFL 160 gt userauth 1 Login IP Address Interface Timeouts Privileges userl 192 168 456 xauthtunnel none 28m user2 192 168 4 44 xauthtunnel none 27m Userdb Syntax Userdb lt dbname gt lt wildcard gt or lt username gt Display user databases and their contents If lt dbname gt is specified users configured in that user database will be shown A wildcard can be used to only show users matching that pattern or if a username is specified information regarding that user will be shown Options num Displays the specified number of users default 20 Example DFL 160 gt userdb Configured user databases Name users 112 Userdb Appendix A CLI Reference LocalUsers 2 DFL 160 gt userdb LocalUsers Contents of user database LocalUsers Username Groups Static IP Remote Networks bob sales alice tech DFL 160 gt userdb LocalUsers bob aro ietcsoja ror D09 sua Careloase LocalUsers Username bob Groups sales Networks 113 Appendix B Windows IP Setup A Microsoft Windows PC can be used as the management workstation for initial setup of a DFL 160 Usually explicit configuration of the IP address of the PC s chosen Ethernet interface should not be needed since the DFL 160 automatically assigns the workstation s address using DHCP If DHCP cannot be used the workstation IP address should be configured manually and this section describes the steps to do that
32. IPSEC STATUS IPsec Interface Name Local IP Broadcast Local Network Remote Network Remote Gateway IKE Mode D H modp group NAT Traversal SA per PFS Config Mode DHCP over IPsec Add Route XAUTH Client XAUTH Keep alive Authentication MTU Send Rate Receive Rate List all active IKE SAs An IKE Security Association SA is an entity that defines the encryption methods and other parameters that will be used for data flowing from one end of an IPsec tunnel to the other SAs are set up after the two ends of a VPN tunnel use the Internet Exchange Protocol IKE to agree how they will communicate A single SA applies to data flowing in only one direction and for that reason TPsec_RemoreUsers_WinkP Ww IPsec_RemoteUsers_ VVinXP 10 6 28 160 0 0 0 0 10 6 28 160 0 0 0 0 0 0 0 0 0 0 Main 2 Enabled if needed and supported by the remote peer Net Disabled Disabled Disabled Enabled Disabled Disabled Disabled PSK L2TPServ_RemoteUsers_WinXP 1420 0 kbps 0 kbps an IPsec tunnel usually has two SAs set up An example of the SA status display is shown below IPSEC SAS Remote Gateway 10 6 200 4 10 6 200 3 Local Net Remote net Protocol 10 6 28 160 10 6 200 4 10 6 28 160 10 6 200 3 82 6 9 User Authentication Status Chapter 6 The Status Menu 6 9 User Authentication Status This page of the web interface displays the users who have been authenticated and
33. LAN network are never allowed However the opposite is always true connections initiated by hosts on the LAN network are always allowed to the DMZ network This arrangement prevents a host that becomes infected on the DMZ spreading the problem to the LAN network This implements one of the prime purposes of the DMZ which is to be a network where hosts which receive connections from the public Internet can be placed Specifying Custom Traffic By clicking the Custom Traffic tab and then selecting Add gt Custom Traffic it is possible to allow through a protocol not specified in the pre defined list Custom Traffic For a custom protocol it is necessary to specify if the protocol uses TCP or UDP connections or both and to specify the port number that the protocol will try and connect to at the other end of the connection The presentation of the new custom rule options in the web interface is shown below 42 4 2 Outbound DMZ Traffic Options Chapter 4 The Firewall Menu Protocol Specifies whether this service uses the TCP or UDP protocol or both Port s Specifies the destination port s of the traffic to be allowed Schedule The schedule defines when the specified traffic should be allowed Specifying a Schedule A named Schedule can be defined through the Firewall gt Schedules menu option and this can then be used with any individual protocol allowed for outgoing traffic from the LAN interface Schedules specify a pe
34. OU NETDEFEND SOHO UTM FIREWALL USER MANUAL NETWORK SECURITY SOLUTION http www dlink com tw D Link Building Networks for People User Manual D Link DFL 160 Firewall NetDefendOS Version 2 25 D Link Corporation No 289 Sinhu 3rd Rd Neihu District Taipei City 114 Taiwan R O C http www DLink com Published 2009 05 14 Copyright O 2009 User Manual D Link DFL 160 Firewall NetDefendOS Version 2 25 Published 2009 05 14 Copyright O 2009 Copyright Notice This publication including all photographs illustrations and software is protected under international copyright laws with all rights reserved Neither this manual nor any of the material contained herein may be reproduced without written consent of the author Disclaimer The information in this document is subject to change without notice The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose The manufacturer reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of the manufacturer to notify any person of such revision or changes Limitations of Liability UNDER NO CIRCUMSTANCES SHALL D LINK OR ITS SUPPLIERS BE LIABLE FOR DAMAGES OF ANY CHARACTER E G DAMAGES FOR LOSS OF PROFIT SOFTWARE RESTORATION WORK STOPPAGE LOSS OF SAVED DATA OR ANY OTH
35. P server 2 Oran L2TP server to which L2TP clients connect e PPTP tunnels Using PPTP tunnels the DFL 160 can either be 1 A PPTP client which connects to a PPTP server 2 Ora PPTP server to which PPTP clients connect Pressing the Add button on the initial VPN page of the web interface allows the administrator to define a tunnel based on one of these protocols The following sections explore these options in greater depth In the web interface the L2TP and PPTP setup options are grouped together into the same pages This is because of their similarity L2TP is a protocol that has superseded PPTP but PPTP is still used in some scenarios 4 4 1 IPsec This section explains the IPsec options available when setting up an IPsec based VPN tunnel An IPsec Overview Internet Protocol Security IPsec is a standardized set of protocols that provide highly secure data transportation IPsec is made up of two parts e The Internet Key Exchange protocol IKE e IPsec protocols AH and ESP The first part IKE is the initial negotiation phase where two VPN tunnel endpoints agree on which methods will be used to provide transportation and security for the data traffic IKE manages connections by creating a set of Security Associations SAs for each tunnel An SA is unidirectional so there are usually at least two for each IPsec connection The second part is the actual data transfer and this is done using the encryption and authe
36. Psec VPN gateways and remote clients Syntax ipsecstats lt options gt Options u Append SA usage num lt connection number gt Show this connection number Example DFL 160 gt ipsecstats gt IPSEC S S Displaying one line per SA bundl VPN Tunnel Local net Remote net Remote GW vpn home 19 LG 1230 24 192 168 2 32 192 168 1 2 32 IPsectunnels Display configured IPsec VPN connections Syntax ipsectunnels Example DFL 160 gt ipsectunnel No Name Local Net Remote Net Remote GW 1 vpn home 192 108 123 0 24 0 0050 0 0 0 0 10 106 License Killsa Appendix A CLI Reference Kills all IPsec and IKE SAs for the specified IP address Syntax killsa lt ipaddr gt Example DFL 160 gt killsa 192 168 0 2 Destroying all IPsec amp IKE SAs for remote peer 192 168 0 2 License Shows the content of the license file Syntax license Lockdown Sets local lockdown on or off During local lockdown only traffic from admin nets to NetDefendOS itself is allowed Everything else is dropped Note If local lockdown has been set by NetDefendOS itself due to licensing or configuration problems this command will NOT remove the lock Syntax lockdown on off Logout Only works on the serial or local console it is used to logout the current user and enable the password Syntax logout Memory Displays core memory consumption Also displays detailed memory use of some
37. URE Active in 1 seconds Shutdown reason Reconfigure due to CLI command Routes Displays information about the routing tables contents of a named routing table or a list of routing tables along with a total count of route entries in each table as well as how many of the entries are single host routes Note that core routes for interface IP addresses are not normally shown use the all switch to show core routes also In the Flags field of the routing tables the following letters are used M Route is Monitored A Published via Proxy ARP D Dynamic from for example IPsec L2TP PPP servers etc Syntax routes lt options gt lt table name gt Options all Also show routes for interface addresses num lt n gt Limit display to lt n gt entries default 20 nonhost Do not show single host routes lookup lt ip gt Lookup the route for the given IP address v Verbose Example DFL 160 gt routes Flags Network Iface Gateway Local 19 Metile 192 1680 12 0 22 lam 0 1942 0 24 wan 0 0 0 0 0 0 wan 194 4 do ik 0 DFL 160 gt routes lookup 193 1 2 3 ILOOlsine ua LOS 1 253 a ote las talle masias Matching route 0 0 0 0 0 Routing table main Send via iface wan Gateway 194 2 1 1 108 Rules Rules Appendix A CLI Reference PIES US foal Local IP use iface IP in ARP queries Meee 0 Flags Shows the contents of the Rules configuration section Syntax rules
38. able to introduce blocking gradually Allow Reclassification This option displays a web page that shows a URL has been flagged by the WCF database and gives the user a link to request reclassification of the URL This option provides users a way to give feedback when they believe the WCF subsystem is incorrectly classifying URLs E Static URL Filters 53 4 6 2 The Content Categories Chapter 4 The Firewall Menu It is possible to explicitly allow or explicitly block certain URLs by adding one or more Static URL Filters This is also referred to as whitelisting and blacklisting and the URLs specified in such filters are not looked up by the WCF subsystem When defining a URL filter it is important to note that wildcarding can be used when specifying the URL The wildcard character can represent any sequence of characters in the URL For example the URL filter blacklist blocked_site com will block all pages with URLs that end with blocked_site com If we want to now explicitly allow one particular page in this domain then this can be done using a whitelist URL filter of the form ok_page blocked_site com The blacklisting URL filter above will not prevent this page from being reachable since the whitelist has precedence Monitoring WCF The log messages generated by WCF can be viewed through the Status menu and this is described in Section 6 4 Web Content Filtering Status A graphical summary of WCF activity show
39. acket sniffer if it is available If the Input counters are increasing the LAN interface may not be attached to the correct physical network There may also be a problem with the routing information in any connected hosts or routers 5 Using the arpsnoop CLI command A final diagnostic test is to try using the console command DFL 160 gt arpsnoop all This will show the ARP packets being received on the different interfaces and confirm that the correct cables are connected to the correct interfaces 2 4 Console Port Connection Chapter 2 Initial Setup 2 4 Console Port Connection Initial setup of the DFL 160 can be done using only the web interface but DFL 160 also provides a Command Line Interface CLI which can be used for certain administrative tasks This is accessed through a console connected directly to the unit s RS232 COM port which is shown below All CLI commands are listed in Appendix A CLI Reference The console also provides the ability to interact directly with the firmware that controls the operation of the DFL 160 see Chapter 8 The Console Boot Menu Console Setup When setting up a console connected directly to the DFL 160 s RS232 port the console can be a traditional dumb console device but is more typically a PC or other computer running console emulation software such as the HyperTerminal software included with some Windows versions An included RS232 null modem cable is used to connect the
40. anually in the Configure pull down menu e00 Network Location Automatic H cerca e FireWire 2 Q Status Cable Unplugged The cable for Ethernet is not plugged in Configure Y Using DHCP IP Address Subnet Mas Router Using DHCP with manual address Using BootP Off Universal Access DNS Servet Create PPPoE Service Search Domains 1 id Click the lock to prevent further changes Ciana O Assistme Revert Apply 116 Appendix C Apple Mac IP Setup 5 Now set the following values IP Address 792 168 10 30 e Subnet Mask 255 255 255 0 e Router 792 168 10 1 Location Automatic Z e Bluetooth Not Connected Status Cable Unplugged Ethernet The cable for Ethernet is not plugged in Not Connected FireWire co Y Configure Manually AirPort A IP Address 192 168 10 30 O or F Subnet Mask 255 255 255 0 Router 192 168 10 1 DNS Server Search Domains nary Advanced 2 O ick te tock to prevent further changes Creve 6 Click Apply to complete the static IP setup Note Your revision of MacOS may differ slightly from the screenshots shown above but the setup method should be principal 117 Appendix D D Link Worldwide Offices Below is a complete list of D Link worldwide sales offices Please check your own country area s local website for further details regarding support of D Link pro
41. ar when NetDefendOS loading is interrupted with a key press are shown below Select menu item The Start firewall option re continues the interrupted NetDefendOS startup process If the Login option is chosen the console password must be entered and the full boot menu described above is entered Removing the Console Password Once the console password is set it can be removed by selecting the Set console password option in the boot menu and entering nothing as the password and just pressing the Enter key to the prompt The Console Password is only for the Console The password set for the console is not connected to the management passwords used for administrator access through a web browser It is valid only for console access 97 Chapter 9 Troubleshooting When the DFL 160 does not behave as expected the following CLI tools are available to troubleshoot problems The stat CLI Command If a serious NetDefendOS problem is suspected then the first step should be to use the console command gt SLEE The stat command will indicate the date and time of the last system shutdown and can indicate if there has been a serious error in NetDefendOS operation It should be remembered however that the buffer which stat uses is cleared by certain operations such a reconfigure and the output will not therefore show what occurred prior to buffer clearance The dconsole CLI Command The next step if to use the console command g
42. assword Z Language English The available management web interface language options are selectable at the bottom of this dialog This defaults to the language set for the browser if NetDefendOS supports that language Now login with the username admin and the password admin The full web interface will now appear as shown below and you are ready to begin setting up the initial DFL 160 configuration Frmware Versi 00 LA Lin SYSTEM FIREWALL System Information Model DFL 160 System Time 2008 10 30 00 28 19 Uptime 0 days 00 58 06 Configuration Version 10 Firmware Version 126Mp 2 25 00 04 9048 we Oct 24 2008 sam Last Restart 32 Mb 2008 10 30 00 23 32 Activating configuration 5 changes 2h row gt 1 ron Configuration Log more Error s 0 Wamig s 0 21 78 1288 ___ ME 269 12000 0 30 This initial web interface page after login always displays the System option in the Status menu as shown above As a first step it is recommended to click on the different menus shown in the top menu bar to a get a feel where different options are located This menu structure is duplicated in the layout of later chapters that describe the options During initial setup the System menu is the only set of options that should need to be changed SS DFL 160 SYSTEM FIREWALL TOOLS Logging Out When you have finished working with the management web interface it is recommended to always logout t
43. at follow describe the options in this menu in the order they appear 4 1 Outbound LAN Traffic Options The Meaning of Outbound These options determine what types of traffic can pass between the LAN network on the protected inside of the DFL 160 and the WAN interface when the connection is initiated by a client or host on the LAN network For instance the retrieval of data from a web server on the public Internet is still considered part of outbound traffic if the retrieval request is initiated by a web surfer sitting on the LAN network Allowing Services A Service refers to a higher level protocol such as the HTTP protocol used for web surfing and is a convenient way of identifying different types of data traffic The presentation of the first few choices in the web interface is shown below Service Enable Schedule ICMP Ping None HTTP None HTTPS vi None FTP O None Lal fNanel ii By default all services are allowed that is to say no connections initiated from the LAN network are blocked It is recommended however to try and impose restrictions that match the expected needs of the clients and hosts on the LAN network For instance selecting only the HTTP and HTTPS protocols allows only web surfing to take place from the LAN network and other protocols such as FTP will not be allowed Connections from the LAN to the DMZ Connections initiated from the LAN network to hosts on the DMZ network are always a
44. ating IP addresses from a predefined IP range to any users or hosts that require them This option in the Status menu allows the administrator to see which DHCP servers are configured and the status of these servers Each line is the display shows the current usage of a DHCP server and provides the ability to drill down to show the current Leases and Mappings for that server Interface IP Span DHCPSrvlan 10 6 58 20 30 oo MS amp Leases DHCPSrvdmz 192 168 2 100 149 O AS y Leases 21 Mappings 21 Mappings 85 6 11 DHCP Server Status Chapter 6 The Status Menu 86 Chapter 7 The Maintenance Menu e The Update Center page 87 e Licenses page 89 e Backups page 91 e Reset to Factory Defaults page 92 e Upgrades page 93 e Technical Support page 94 E MAINTENANCE The Maintenance menu options deal with routine administrative tasks such as backups and software upgrades UPDATE CENTER LICENSE UPGRADE TECHNICAL SUPPORT The sections that follow describe the options in this menu in the order they appear 7 1 The Update Center The Update Center refers to the external network of D Link servers that supply updates for the Anti Virus and IDP databases This portion of the web interface is divided into 3 tabs A General B Update Interval C History A General This section of the interface allows the administrator to enable or disable the automatic updating of the IDP and Anti Vir
45. automatically gets the same IP address as the WAN interface Interface IP Address Netmask 255 255 255 0 Enable DNS Relay Relay DNS queries sent to the DMZ interface IP The setting Relay DNS queries sent to the DMZ interface IP should be enabled if for example web browsers running on LAN clients are going to be resolved using external DNS servers on the internet Any other situation where URL resolution is required will also need to find a DNS server These DNS servers should be manually configured if this hasn t already been done automatically through DHCP when connecting to an ISP B Mode There are three modes that are available with the LAN interface The presentation of the mode options in the web interface is shown below O Use NAT Mode default Network Address Translation should be enabled unless the DMZ uses public IP addresses In Router Mode NAT is disabled and clients on the internal networks need to Use Router Mode be routable from the WAN interface Local clients use this device as default gateway In Transparent Mode the firewall can easily be deployed in an already O Use Transparent Mode established environment without any need for changing the configuration of the present network devices NAT Mode This mode enables Dynamic Network Address Translation NAT use between the DMZ and WAN interfaces This means that the individual IP addresses of hosts on the DMZ interface will be hidden from t
46. be e www nateast co uk e www borganfanley com Category 13 Crime Terrorism A web site may be classified under the Crime Terrorism category if its content includes the description promotion or instruction in criminal or terrorist activities cultures or opinions Examples might be www beatthecrook com Category 14 Personal Beliefs Cults A web site may be classified under the Personal Beliefs Cults category if its content includes the description or depiction of or instruction in systems of religious beliefs and practice Examples might be e www paganfed demon co uk e www cultdeadcrow com Category 15 Politics A web site may be classified under the Politics category if its content includes information or opinions of a political nature electoral information and including political discussion groups Examples might be e www democrats Org au e www political com Category 16 Sports A web site may be classified under the Sports category if its content includes information or instructions relating to recreational or professional sports or reviews on sporting events and sports scores Examples might be e www sportstoday com e www soccerball com Category 17 www Email Sites A web site may be classified under the www Email Sites category if its content includes online web based email facilities Examples might be www coldmail com e mail yazoo com 57 4 6 2 The Content Categories C
47. be enabled For example IP TV is an application that typically makes use of multicast data transfers 44 4 3 Inbound Traffic Options Chapter 4 The Firewall Menu Multicast traffic can be forwarded to local clients on LAN and DMZ if the clients have requested the traffic using the IGMP protocol Multicast Groups 224 0 2 0 239 255 255 255 Multicast groups to allow C Custom Traffic If a particular protocol does not appear in the standard list of protocols then a Custom Traffic rule can be created which allows incoming TCP or UDP traffic through on a specified port Custom Traffic As explained above the custom rule must have a destination IP address specified which either an internal IP address if NAT is being used of a public IP if NAT is not being used The port number must be different from any other rule for the same protocol if NAT is being used The presentation of the new custom inbound rule options in the web interface are shown below Name Protocol Specifies whether this service uses the TCP or UDP protocol or both Destination Port s Specifies the destination port s of the traffic to be forwarded Destination IP Destination IP address of local server or host Schedule The schedule defines when the specified traffic should be forwarded 45 4 4 VPN Options Chapter 4 The Firewall Menu 4 4 VPN Options VPN Usage The Internet is increasingly used as a means to connect together com
48. be useful for troubleshooting For example if an unexpectedly large number of packets begin queuing or when traffic does not seem to be flowing for an unknown reason By analyzing the contents of the buffers it is possible to determine whether such traffic is making it to the DFL 160 at all Syntax buffers Brings up a list of most recently freed buffers Example DFL 160 gt buff Displaying the 20 most recently freed buffers RecvlIf Num Size Protocol Sender Destination wan i274 1211 wipe ODA SS LIS NIZ MUS AS Si lan S37 ISiL UDI 192 108 123137 192 1068 3 183 wan 474 112 UDP 192 LS Ss 183 192 ISS LAS 187 wan SO 91 UDP LIZ WSS 5 So IS WIZ WSS MAS y US lan 419 142 UDP 192 188 123137 1925108 3 193 wan Has S22 wipe 194 2 150 1921808 1230 182 lan 962 60 UDP 192 SIGS 12S LS 194 2 DO lan 687 60 ARP OSO ECAT sea IREI 8 R122 Sar ie IRE wan 268 88 UDP EAS 5 18S WO IMGs 123 137 lan 249 101 UDP 192 188 123 137 192 Os 3 18S wan Zig 60 Wee 193 125335 105 192 108 1230 12 lan 647 60 ARP OOLOSAVOT sckelSi APP SARE IEE S EI IIE wan 1185 98 UDP TIZ 168 35 LBS 192 188 123 137 lan 912 98 UDP 192 1508 1235137 192 1083 183 wan O82 112 DIS QZ GS ORSO NOZ OSa NAS e S lan 544 SOCIE IQA 1508 12312 194 2 ADO lan 633 COMEGE 192 168512326 i194 2 1 50 lan 447 CORRCE 192 1508 l AS A ADA 2 1 SC lan 645 COM REE U2 MGS 123 23 IZ oi oe lan ASAS RUDE 192 158 123 137 1921083 193 Syntax buffer lt number
49. c must be unique The solution is to change the HTTPS port for administrator access to for example port 400 Then the administrator surfs to the IP https 192 168 10 1 400 to access the web management interface 4 Important 0 The above must be done if there is a clash of port numbers after enabling inbound traffic Management Through the Serial Console Some administration tasks can be carried out through a console device attached directly to the serial port of the DFL 160 There are two administration options e Using the boot menu The boot menu can be accessed between power up and completion of NetDefendOS startup It is used for performing a limited set of low level administration tasks and is described fully in Chapter 8 The Console Boot Menu e Using CLI Commands Once NetDefendOS has booted up and started a set of CLI commands can be entered through the console These commands are listed and described in Appendix A CLI Reference 24 3 2 Internet Connection Chapter 3 The System Menu 3 2 Internet Connection The options on this page allow the administrator to specify the communications protocol with which the WAN interface is connected to the public Internet via an Internet Service Provider ISP Your ISP will provide details of their connection The first task is to make a physical Ethernet connection between the DFL 160 s WAN interface and the ISP This might be typically done through some form of broadband
50. ce is being used The most obvious problem is that the wrong DFL 160 interface has been used for the initial connection Only the LAN interface is enabled for managment access for the initial connection from a browser after NetDefendOS starts for the first time 2 Is the LAN interface properly connected Check the link indicator lights on the management interface If they are dark then there may be a cable problem 3 Check the cable type connected to the management interface If the management interface is connected directly to the management workstation or another router or host In this case an Ethernet cross over cable may be needed for the connection depending on the capabilities of the interface 4 Using the ifstat CLI command To investigate a connection problem further connect a console to the RS232 port on the DFL 160 after NetDefendOS starts Details of making this connection is described below in Section 2 4 Console Port Connection When you press the enter key NetDefendOS should respond with the standard CLI prompt DFL 160 gt Now enter the following command a number of times DFL 160 gt ifstat lan This will display a number of counters for the LAN interface If the Input counters in the hardware section of the output are not increasing then the error is likely to be in the cabling However it may simply be that the packets are not getting to the DFL 160 in the first place This can be confirmed with a p
51. components and lists Syntax memory Sends a specified number of ICMP Echo Request packets to a given destination All packets are sent in immediate succession rather than one per second and this behavior is best suited for diagnosing connectivity problems Pinging can optionally be done on specific ports using UDP or TCP Syntax ping lt IPAddr gt lt options gt lt of packets gt lt size gt Options r lt recvif gt Run through the rule set simulating that the packet was received by lt recvif gt s lt srcip gt Use this source IP p lt table gt Route using the specified PBR table v Verbose ping t lt ipaddress gt p lt port gt Ping the specified IP address on the specified port using TCP u lt ipaddress gt p lt port gt Ping the specified IP address on the specified port using UDP Example DFL 160 gt ping 192 168 12 1 senciiag L ing co 192 168 121 Tom 192 108 14115 107 ReConfigure Appendix A CLI Reference using PBR table main Echo reply from 192 168 12 1 seq 0 time 10 ms TTL 255 DFL 160 gt ping 192 168 12 1 v Seinchling i ping co 192 168 12 1 Trom 192 108 14 15 using PBR table main So Using roure 192 188 12 0 22 wie wein mo Gw in PAR talle masial Echo reply from 192 168 12 1 seq 0 time lt 10 ms TTL 255 ReConfigure Reinitializes NetDefendOS Syntax reconfiure Example DFL 160 gt reconfigure Shutdown RECONFIG
52. connected to the public Internet via your Internet Service Provider ISP The basic management options for the WAN interface are described in Section 3 2 Internet Connection Interface Link Speed Capabilities The physical speed capabilities are as follows 1 3 The LED Indicators Chapter 1 Product Overview 1 3 The LED Indicators On the front portion of the DFL 160 casing are a set of indicator lights which show system status and Ethernet port activity Power and Status The power light is illuminated when power is applied and the status light is illuminated after NetDefendOS has completed start up or if the boot menu has been entered prior to complete startup the latter is described in Chapter 8 The Console Boot Menu Ethernet Ports On the right hand side of the front of the DFL 160 there is a line of LED lights that show the status of the different Ethernet interfaces by showing a flashing or solid light in orange or green The image below shows these LED status indicators WAN DMZ q E o AAA 1 2 3 4 DFL 160 1 3 The LED Indicators Chapter 1 Product Overview Chapter 2 Initial Setup e Unpacking page 11 e Web Browser Connection page 13 e Browser Connection Troubleshooting page 18 e Console Port Connection page 19 2 1 Unpacking Package Contents Carefully open the product packaging and inside you will find the following The DFL 160 hardware unit Th
53. d Rate 712 kbps Receive Rate 33720 kbps B Driver Information Hardware Statistics This section of the display shows summary performance values for the chosen interface An example of the typical output is shown below IN packets 7126 75611 OUT packets 356556501 Multicast packets dropped dropped Collisions In Length Errors Overruns In CRC Errors In Frame Errors In FIFO Overruns in Packets Missed Out Sends Aborted Out Carrier Errors Out FIFO Underruns 000000000000d4n Out Late Collisions C Throughput Statistics The throughput statistics over the last 24 hours are shown in graphical form as shown below First are the statistics for sent outgoing traffic An example of this is shown below the image is truncated on the right side 80 6 7 Interfaces Status Chapter 6 The Status Menu SEND RATE OVER THE PAST 24 HOURS 2000Kbps 1500Kbps 1000Kbps 500Kbps Secondly the statistics for received incoming traffic are shown over the last 24 hours An example is shown below the image is also truncated on the right side RECEIVE RATE OVER THE PAST 24 HOURS 100Mbps 75Mbps 50Mbps 25Mbps 81 6 8 IPsec Status Chapter 6 The Status Menu 6 8 IPsec Status List VPN Interfaces This option the default shows all the currently established VPN tunnels also known as VPN interfaces An example of this display is shown below
54. ducts as well as contact details for local support Australia Belgium Brazil Canada China Czech Republic Denmark Egypt Europe UK Finland France Germany Greece Hungary India Israel 1 Giffnock Avenue North Ryde NSW 2113 Australia TEL 61 2 8899 1800 FAX 61 2 8899 1868 Website www dlink com au Rue des Colonies 11 B 1000 Brussels Belgium Tel 32 0 2 517 7111 Fax 32 0 2 517 6500 Website www dlink be Av das Nacoes Unidas 11857 14 andar cj 141 142 Brooklin Novo Sao Paulo SP Brazil CEP 04578 000 Zip Code TEL 55 11 21859300 FAX 55 11 21859322 Website www dlinkbrasil com br 2180 Winston Park Drive Oakville Ontario L6H 5W1 Canada TEL 1 905 8295033 FAX 1 905 8295223 Website www dlink ca No 202 C1 Building Huitong Office Park No 71 Jianguo Road Chaoyang District Beijing 100025 China TEL 86 10 58635800 FAX 86 10 58635799 Website www dlink com cn Vaclavske namesti 36 Praha 1 Czech Republic TEL 420 603 276 589 Website www dlink cz Naverland 2 DK 2600 Glostrup Copenhagen Denmark TEL 45 43 969040 FAX 45 43 424347 Website www dlink dk 47 El Merghany street Heliopolis Cairo Egypt TEL 202 2919035 202 2919047 FAX 202 2919051 Website www dlink me com 4th Floor Merit House Edgware Road Colindale London NW9 SAB UK TEL 44 20 8731 5555 FAX 44 20 8731 5511 Website www dlink co uk Latokartanontie 7A FIN
55. e that may cause undesired operation This Equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular instal lation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help The Class B digital apparatus complies with Canadian ICES 003 Cet appareil numerique de la class B est conforme a la norme NMB 003 du Canada FCC CAUTION Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment CE VCCI WARNING Statement
56. e DFL 160 Quick Installation Guide A plug in 12 Volt 1 2 Amp power supply with connecting cable One Category 5e Ethernet cable One RS232 cable for connecting a console to the DFL 160 serial COM port A CD ROM containing essential product documents and useful software utilities Location of the Hardware The DFL 160 unit is designed for table mounting only The product can be mounted on any appropriate stable flat level surface that can safely support the weight of the unit and its attached cables 2 1 Unpacking Chapter 2 Initial Setup Environmental and Operating Parameters The following table lists the key environmental and operating parameters for the DFL 160 hardware Heat Flow Considerations The DFL 160 is a low power device that generates a modest amount of heat output during operation The following precautions should be taken to allow this heat to dissipate Do not install the DFL 160 in an environment where the operating ambient temperature might come close to or go beyond the recommended operating temperature range as stated in the table above the operating range is from 0 C to 50 C Make sure that airflow around the DFL 160 unit is not restricted e Do not place anything on top of the unit including any other electronic devices Power Supply Precautions The following is recommended in regard to the power supply e Make sure that any power source circuits are properly grounded and use th
57. e admin with a password admin exists when a brand new DFL 160 is started for the first time It is recommended at a minimum to change the password of this user as one of the first steps during initial setup Admin Login Name Password Confirm Password If desired the username admin can also be changed and this will also boost security for administrator access A second user with username audit is also defined but must be explicitly enabled by ticking the checkbox on the web interface page The audit user has read only access to the NetDefendOS They can see the entire NetDefendOS web interface but cannot make any configuration changes The default password for the audit user is audit and this also as a minimum should be changed as soon as possible if the audit user is enabled If desired the audit username can also be changed from audit to something else C Management Ports The default port numbers for HTTP and HTTPS management access can be changed This must be done if normal inbound traffic is enabled for the same protocol that is used for management access 23 3 1 Administration Chapter 3 The System Menu HTTP Port HTTPS Port For instance if HTTPS is used for management access and HTTPS inbound traffic is enabled this is done in Section 4 3 Inbound Traffic Options then both will use the port number 443 and there will be a problem The port number for management traffic and normal HTTPS traffi
58. e found in Section 4 9 Schedules 41 4 2 Outbound DMZ Traffic Options Chapter 4 The Firewall Menu 4 2 Outbound DMZ Traffic Options The Meaning of Outbound These options determine what types of traffic can pass between the DMZ network and the WAN interface when the connection is initiated by a client or host on the DMZ network For instance the retrieval of data from a web server on the public Internet is still considered part of outbound traffic if the retrieval request is initiated by a web surfer sitting on the DMZ network The options on the page of the web interface follow the same pattern described for the LAN interface described in Section 4 1 Outbound LAN Traffic Options although there are some differences Allowing Services A Service refers to a higher level protocol such as the HTTP protocol used for web surfing and is a convenient way of identifying different types of data traffic The presentation of the first few choices in the web interface is shown below Service Enable Schedule ICMP Ping None HTTP None HTTPS iv None None fNanel By default all services are allowed that is to say no connections initiated from the DMZ network are blocked It is recommended however to try and impose restrictions that match the expected needs of the clients and hosts on the DMZ network Connections from the DMZ to the LAN Connections initiated from the DMZ network to hosts on the
59. e power cord supplied with the DFL 160 to connect it to the power source Ensure that the DFL 160 does not overload the power circuits wiring and over current protection To determine the possibility of overloading the supply circuits add together the ampere ratings of all devices installed on the same circuit as the DFL 160 and compare the total with the rating limit for the circuit The maximum ampere ratings are usually printed on the devices near AC power connectors e If your installation requires any power cords other than the one supplied with the product be sure to use a power cord displaying the logo of the safety agency that defines the regulations for power cords in your country The logo is your assurance that the power cord can be used safely with the DFL 160 The purchase and use of a separate surge protection unit from a third party should be considered to protect against damage by electrical power surges This is particularly recommended in geographic regions where lightning strikes might occur Software Installation A copy of the NetDefendOS network operating system is already pre installed on the DFL 160 unit When the unit is powered up NetDefendOS will automatically start for the first time with the factory default settings Initial startup is described in Section 2 2 Web Browser Connection 12 2 2 Web Browser Connection Chapter 2 Initial Setup 2 2 Web Browser Connection This section describes
60. ed by NetDefendOS An IP rule determines what protocols can flow between what interfaces in the DFL 160 The default value is normally sufficient IPsec Tunnels The maximum number of IPsec tunnels which terminate at the WAN interface that can be created 89 7 2 Licenses Chapter 7 The Maintenance Menu PPP Tunnels The maximum number of PPP tunnels which terminate at the WAN interface that can be created To expand the capabilities of the standard product license consult with your local D Link representative 90 7 3 Backups Chapter 7 The Maintenance Menu 7 3 Backups The administrator has the ability to take a snapshot of a NetDefendOS system at a given point in time and restore it when necessary The snapshot can be of two types e A configuration backup which does not include the installed NetDefendOS version This is a recommended precaution to allow the configuration at a given point in time to be restored provided the NetDefendOS version does not change e A system backup which is a complete backup of both the configuration and the installed NetDefendOS software This is a recommended precaution if both the configuration is to be changed and the NetDefendOS version is upgraded To restore a backup file the administrator should upload a backup file to the DFL 160 The name of the file does not really matter since NetDefendOS will read a header in the file to determine what it is Backups Do Not Con
61. er the Spam category if it is found to be contained in bulk or spam emails Examples might be e kaqsovdi gjibhgk info e www pleaseupdateyourdetails com Category 32 Non Managed Unclassified sites and sites that do not fit one of the other categories will be placed in this category It is unusual to block this category since this could result in most harmless URLs being blocked 60 4 7 Anti Virus Chapter 4 The Firewall Menu 4 7 Anti Virus Overview The NetDefendOS Anti Virus module protects against malicious code carried in file downloads Files may be downloaded as part of a web page in an HTTP transfer or in an FTP download or perhaps as an attachment to an email delivered through SMTP Malicious code in such downloads can have different intents ranging from programs that merely cause annoyance to more sinister aims such as sending back passwords credit card numbers and other sensitive information The term Virus can be used as a generic description for all forms of malicious code carried in files Combining with Client Virus Scanning Unlike IDP which is primarily directed at attacks against servers Anti Virus scanning is focused on downloads by clients NetDefendOS Anti Virus is designed to be a complement to the standard antivirus scanning normally carried out locally by specialized software installed on client computers IDP is not intended as a complete substitute for local scanning but rather as an extra shield t
62. essed during these 3 seconds then NetDefendOS startup pauses and the console boot menu is displayed Initial Boot Menu Options without a Password Set When NetDefendOS is started for the first time with no console password set for console access then the full set of boot menu options are displayed as shown below The options available in the boot menu are 1 Start firewall This initiates the complete startup of the NetDefendOS software on the DFL 160 2 Reset unit to factory defaults This option will restore the hardware to its initial factory state The operations performed if this option is selected are the following e Remove console security so there is no console password e Restore default NetDefendOS executables along with the default configuration 3 Revert to default configuration This will only reset the configuration to be the original default NetDefendOS configuration file Other options such as console security will not be affected 4 Set console password 96 Chapter 8 The Console Boot Menu A password should be set for console access If a password is not set anyone can use the console After it is set the console will prompt for the password before access is allowed to either the boot menu or the command line interface CLI more on the CLI can be found in Appendix A CLI Reference Initial Options with a Console Password Set If a console password is set then the initial options that appe
63. f its content includes facilities to submit and review personal advertisements arrange romantic meetings with other people mail order bride foreign spouse introductions and escort services Examples might be adultmatefinder com e WWW marri agenow com Category 10 Game Sites A web site may be classified under the Game Sites category if its content focuses on or includes the review of games traditional or computer based or incorporates the facilities for downloading computer game related software or playing or participating in online games Examples might be e www gamesunlimited com e www gameplace com Category 11 Investment Sites A web site may be classified under the Investment Sites category if its content includes information services or facilities pertaining to personal investment URLs in this category include contents such as brokerage services online portfolio setup money management forums or stock quotes This category does not include electronic banking facilities refer to the E Banking category 12 Examples might be e www loadsofmoney com au e www putsandcalls com Category 12 E Banking 56 4 6 2 The Content Categories Chapter 4 The Firewall Menu A web site may be classified under the E Banking category if its content includes electronic banking information or services This category does not include Investment related content refer to the Investment Sites category 11 Examples might
64. file is a small fraction of the original uncompressed file size This can mean that a comparatively small compressed file attachment might need to be uncompressed into a much larger file which can place an excessive load on NetDefendOS resources and noticeably slowdown throughput The Virus Signature Database NetDefendOS Anti Virus scanning is implemented by pattern matching against a virus signature database maintained locally in the DFL 160 s memory This database is the SafeStream virus signature database which is created and maintained by Kaspersky a company which is a world 61 4 7 Anti Virus Chapter 4 The Firewall Menu leader in the field of virus detection The database provides protection against virtually all known virus threats including trojans worms backdoor exploits and others The database is also thoroughly tested to provide near zero false positives NetDefendOS Anti Virus scanning is a subscription based service and yearly subscriptions can be purchased from your local D Link agent After purchase you will receive a code which is then used for activating IDP A subscription means that the SafeStream database is updated on a daily basis from D Link servers with any new virus signatures that become available Older signatures are seldom retired but instead are replaced with more generic signatures covering several viruses Anti Virus Settings The NetDefendOS Anti Virus feature provides the option to scan any fi
65. gt Shows the contents of the specified buffer Example DFL 160 gt buff 1059 Decode of buffer number 1059 lan Enet 0050 dadf 7bbf gt 0003 325c cc00 type 0x0800 len 1058 12 192 168 123 10 gt 193 189 792 1 10500320 DataLen 1024 TTL 254 Proto ICMP ICMP Echo reply I1D 6666 Seq 0 Syntax buffer 101 CfgLog Appendix A CLI Reference Shows the contents of the most recently used buffer Example DFL 160 gt buff Decode of buffer number 1059 lan Enet 0050 dadf 7bbf gt 0003 325c cc00 type 0x0800 len 1058 12 192 108 123510 gt 19 13 7951 wens 20 DataLen 1024 TTL 254 Proto ICMP ICMP Echo reply I1D 6666 Seq 0 CfgLog Shows the results of the most recent reconfiguration or start up of the firewall This text is the same as is shown on screen during reconfiguration or start up Syntax cfglog Example DFL 160 gt cfglog Configuration log Configuring from FWCore_N cfg Configuration done Configuration FWCore_N cfg v153 verified for bi directional communication Connections Shows the last 20 connections opened through the DFL 160 Connections are created when traffic is permitted to pass via Allow or NAT rules Traffic permitted to pass under FwdFast is not included in this list Each connection has two timeout values one in each direction These are updated when the firewall receives packets from each end of the connection The value shown in the Timeout column is the lowe
66. hapter 4 The Firewall Menu Category 18 Violence Undesirable A web site may be classified under the Violence Undesirable category if its contents are extremely violent or horrific in nature This includes the promotion description or depiction of violent acts as well as web sites that have undesirable content and may not be classified elsewhere Examples might be e www itstinks com e www ratemywaste com Category 19 Malicious A web site may be classified under the Malicious category if its content is capable of causing damage to a computer or computer environment including malicious consumption of network bandwidth This category also includes Phishing URLs which designed to capture secret user authentication details by pretending to be a legitimate organization Examples might be e hastalavista baby nu Category 20 Search Sites A web site may be classified under the Search Sites category if its main focus is providing online Internet search facilities Refer to the section on unique categories at the start of this document Examples might be e www zoogle com e Wwww yazoo com Category 21 Health Sites A web site may be classified under the Health Sites category if its content includes health related information or services including sexuality and sexual health as well as support groups hospital and surgical information and medical journals Examples might be e www thehealthzone com e www safedrugs com
67. he Firewall Menu 4 5 VPN Users The User Database This page in the web interface allows the administrator to enter the details of new users into the NetDefendOS user database and to also administer these users by making deletions or changes There is no limit on the database size The NetDefendOS user authentication database is used only with VPN When external clients connect through a VPN link to resources protected by the DFL 160 they can be required to provide a unique combination of a userid and a password access without any authentication is also possible For a description of how to set up VPN connections with the DFL 160 see Section 4 4 VPN Options VPN Types That Use VPN Authentication The exact types of VPN actions that rely on this user database are e Access by an external client through an IPsec tunnel through the WAN interface see Section 4 4 1 IPsec e Access by an external client through an L2TP tunnel through the WAN interface where the DFL 160 is acting as an L2TP server see Section 4 4 3 L2TP PPTP Server Note The users in the user database are not connected with the usernames and passwords used for the system administration and system audit functions Those are described in Section 3 1 Administration 51 4 6 Web Content Filtering Chapter 4 The Firewall Menu 4 6 Web Content Filtering 4 6 1 Options The Web Content Filtering WCF options allow control over
68. he ISP Router Mode This is the mode used if NAT is not used It means that each the individual hosts and users on the LAN network need their own public IP addresses if they are to communicate with the public Internet Although not recommended when WAN is connected to the public internet there may be situations where NAT cannot be applied and the individual LAN network addresses need to be exposed through the WAN interface In some scenarios the WAN interface may be connected to another internal network and in this case NAT usage may also not be appropriate because there is no need to shield LAN addresses and there are lots of internal IP addresses that can be used e Transparent Mode This mode is used if the DFL 160 is to be placed between the LAN and WAN interface in a transparent way This means that no IP addresses need to be changed in either network but the traffic flowing between the interfaces is still subject to the rules and controls imposed by NetDefendOS In transparent mode NetDefendOS works out from the traffic itself which networks can be found on the interfaces and creates the necessary entries in its routing table Note Y In transparent mode the LAN interface takes on the same IP address as the WAN interface If both the LAN and DMZ interfaces have transparent mode enabled traffic will flow transparently between all 3 of the DFL 160 interfaces C DHCP Server Settings With this option enabled a range of
69. he Remote endpoint is the IP address of the other end of the tunnel the server s IP address It can be specified as a URI such as gw domain com but if it is then the prefix dns must be added so the full entry would be dns gw domain com The Remote Network is the network behind the server to which the client will communicate B Authentication The client will need a username and password for authentication C IPsec Encryption L2TP usually uses IPsec as its encryption method D Security Authentication This section specifies how authentication is done when connecting to the server E MPPE Microsoft Point to Point Encryption MPPE is an optional encryption method usually used only by PPTP The method chosen must be compatible with the method chosen on the server F Dial on Demand If this option is enabled the tunnel will not be set up until traffic is actually sent 49 4 4 3 L2TP PPTP Server Chapter 4 The Firewall Menu The Idle Timeout is the length of time with inactivity that passes before tunnel disconnection occurs 4 4 3 L2TP PPTP Server This option allows VPN tunnels to be set up based on the L2TP protocol where the DFL 160 acts as a L2TP or PPTP server receiving connection requests from external clients Such clients are sometimes called roaming clients since they might not have a fixed IP address and might connect through temporary connection to a remote network Secure VPN connections by externa
70. he public internet All traffic coming from the public Internet to DMZ hosts will be directed to the public IP address of the WAN interface and NetDefendOS will perform the necessary IP address translation Enabling NAT is a recommended way to shield the users and hosts on the DMZ network from outside users It also means that a DFL 160 requires just a single public IP address to be allocated by the ISP 30 3 4 DMZ Settings Chapter 3 The System Menu Router Mode This is the mode used if NAT is not used It means that each the individual hosts and users on the DMZ network need their own public IP addresses if they are to communicate with the public Internet Although not recommended when WAN is connected to the public internet there may be situations where NAT cannot be applied and the individual DMZ network addresses need to be exposed through the WAN interface In some scenarios the WAN interface may be connected to another internal network and in this case NAT usage may also not be appropriate because there is no need to shield DMZ addresses and there are lots of internal IP addresses that can be used e Transparent Mode This mode is used if the DFL 160 is to be placed between the DMZ and WAN interface in a transparent way This means that no IP addresses need to be changed in either network but the traffic flowing between the interfaces is still subject to the rules and controls imposed by NetDefendOS In transparent
71. he unit will continue to load and start up in default mode as though it were brand new and had never been configured A simple tool such as the tip of a pencil or pen could be used to hold the reset button in Warning Do not abort a reset 0 DO NOT ABORT THE RESET TO FACTORY DEFAULTS PROCESS If aborted the DFL 160 can cease to function properly since it may be left in an inconsistent internal state End of Life Procedures The restore to factory defaults option should also be used as part of the end of life procedure when a DFL 160 is taken out of operation and will no longer be used As part of the decommissioning procedure a restore to factory defaults should always be run in order to remove all sensitive information such as VPN settings As a further precaution at the end of the product s life it is also recommended that the memory media in a DFL 160 is destroyed and certified as destroyed by a suitable provider of computer disposal services 92 7 5 Upgrades Chapter 7 The Maintenance Menu 7 5 Upgrades New releases of NetDefendOS are routinely made available by NetDefendOS These releases are available as a single file which can be uploaded to the DFL 160 through this page in the web interface NetDefendOS upgrades can be downloaded for free from your local D Link site or from the D Link NetDefend Center at http security dlink com tw 93 7 6 Technical Support Chapter 7 The Maintenance Menu 7 6 Techn
72. hnology or trade journals This does not include financial quotes refer to the Investment Sites category 11 or sports refer to the Sports category 16 Examples might be e www newsunlimited com e www dailyscoop com Category 3 Job Search A web site may be classified under the Job Search category if its content includes facilities to search for or submit online employment applications This also includes resume writing and posting and interviews as well as staff recruitment and training services Examples might be e www allthejobs com WWW yourcareer com Category 4 Gambling A web site may be classified under the Gambling category if its content includes advertisement or encouragement of or facilities allowing for the partaking of any form of gambling For money or otherwise This includes online gaming bookmaker odds and lottery web sites This does not include traditional or computer based games refer to the Games Sites category 10 Examples might be e www blackjackspot com e www pickapony net Category 5 Travel Tourism A web site may be classified under the Travel Tourism category if its content includes information relating to travel activities including travelling for recreation and travel reservation facilities Examples might be e www flythere nu e www reallycheaptix com au Category 6 Shopping A web site may be classified under the Shopping category if its content includes any form of adver
73. ical Support This section of the web interface allows the user to easily download a file of useful troubleshooting information that can be emailed to technical support personnel After clicking on the button Download support file a file is automatically generated by the NetDefendOS and downloaded to the web interface and can be saved to the local disk The techsupport CLI Command This file contains the same information that can also be generated on a console with the CLI command DFL 160 gt techsupport 94 7 6 Technical Support Chapter 7 The Maintenance Menu 95 Chapter 8 The Console Boot Menu The NetDefendOS loader is the base software on top of which NetDefendOS runs and the administrator s direct interface to this is called the console boot menu also known simply as the boot menu This section discusses the boot menu options Accessing the Console Boot Menu The boot menu is only accessible through a console device attached directly to the serial console located on the DFL 160 see Section 2 4 Console Port Connection The boot menu can be accessed through the console port after the DFL 160 is powered up and before NetDefendOS is ready After powering up there is a 3 second interval before NetDefendOS fully starts up and in that time the message Press any key to abort and load boot menu is displayed as shown below Starting core in 3 seconds Loading bootmenu cfx M If any console key is pr
74. interface operates These settings are very similar to the corresponding page for the DMZ interface see Section 3 4 DMZ Settings The Logical LAN Interface There are four physical interfaces in the DFL 160 hardware which are labeled LAN LAN4 As explained in Section 1 2 Ethernet Interfaces these are connected together by a switch fabric in the DFL 160 so they act as a single logical interface called LAN This manual therefore refers only to the LAN logical interface and the rules applied to LAN apply to all four physical interfaces but not the traffic flowing between them LAN Interface Options There are three sections on the web interface page relating to the LAN A LAN Interface Settings B Mode C DHCP Server Settings A LAN Interface Settings The IP address of the LAN interface is allocated here for NAT and Routing mode Transparent mode does not require an IP address to be allocated instead the LAN interface automatically gets the same IP address as the WAN interface The presentation of the LAN interface options in the web interface is shown below Interface IP Address Netmask 255 255 255 0 Enable DNS Relay Relay DNS queries sent to the LAN interface IP The setting Relay DNS queries sent to the LAN interface IP should be enabled if for example web browsers running on LAN clients are going to be resolved using external DNS servers on the internet Any other situation where URL resolution i
75. ions Options rules Shows dhcp server rules leases Shows dhcp server leases mappings Shows dhcp server IP gt MAC mappings release Releases an active or blacklisted IP Example DFL 160 gt dhcpserver Contents of the DHCP Server rule set default action is IGNORE Source Pool Gateway DNS1 LTime 1 lan 1921085 320 1 Js Lg cos LIL AS 39 254 IZ IGS S9s25S 1O8OG Active DHCP sessions Rule Iface Client MAC Client IP Expire 1 lan OO SC OTa 192 Aloe 32 214 10746 1 lan 0050 8df5 24a3 192 168 37 88 10700 il lan OVO Sides cl O SS 916 10678 1 lan JOR BSOZ Gled 192 168 34173 10574 1 lan O00 Scil Esae 192 168 34 154 10549 ji lan 003021282987 192 168 383220 10529 Show what external DNS servers are configured for domain name lookups Up to 3 servers can be configured 103 Frags Appendix A CLI Reference Syntax dns Options list List pending DNS queries query lt domain name gt Resolve domain name remove Remove all pending DNS queries Example DFL 160 gt dns DNS elleme als e Al AS CA Using servers DNS Seraves 0 8 10 5 0 19 DNS Server 1 Not set DNS Server Zs Not sere Frags Shows the 20 most recent fragment reassembly attempts This includes both ongoing and completed attempts Syntax frags Example DFL 160 gt frags RecvIf Num State Source Destination Proto Next Timeout lan 2 Dome 10 5 3 2 26 23 5 4 ICME 2000 5 wee t ACC
76. l clients could also be achieved as described previously using IPsec tunnels However IPsec requires special IPsec client software be installed on the client computer which can increase the overall complexity and expense of VPN On many computers such as all Microsoft Windows PCs L2TP and PPTP client software exists as a standard component which means VPN is much simpler to implement The following sections appear in the web interface for setup A General B IP Pool Settings C Authentication D MPPE D Idle Timeout A General In this section of the page the type of tunnel is selected L2TP or PPTP and if the tunnel uses IPsec encryption this is usually only the case for L2TP tunnels B IP Pool Settings The IP Pool is a range of IP numbers that can be handed out to clients as they connect to the DFL 160 using this tunnel Relaying of DNS queries means that URL resolution requests are relayed to a DNS server This will require that the DFL 160 to have at least one DNS server defined C Authentication This section specifies how authentication is done with connecting clients D MPPE Microsoft Point to Point Encryption MPPE is an optional encryption method usually used only by PPTP The method chosen must be compatible with that used by connecting clients E Idle Timeout The dle Timeout is the length of time with inactivity that passes before tunnel disconnection occurs 50 4 5 VPN Users Chapter 4 T
77. l configuration of the workstation interface IP address will be needed There are two appendices in this manual that describe how to do this depending on the workstation e Appendix B Windows IP Setup e Appendix C Apple Mac IP Setup 3 Connect the Power NetDefendOS starts up as soon as the DFL 160 unit is connected to the power supply there is no On Off switch Power is connected by plugging the cable from the power supply into the unit s power plug socket and then plugging the supply into a normal wall socket 12V 1 25A oso Once power is connected NetDefendOS will take a couple of seconds to boot up When this process is complete the Status front panel light is lit and the DFL 160 is ready to be managed through a web browser 2 2 Web Browser Connection Chapter 2 Initial Setup wer Status ws 4 Connect to the DFL 160 by Surfing to the IP address 192 168 10 1 Using a web browser Internet Explorer or Firefox is recommended surf to the IP address 192 168 10 1 This can be done using either HTTP or the more secure HTTPS protocol in the URL These two alternatives are discussed next A Using HTTP Enter the address http 192 168 10 1 into the browser navigation window as shown below This will send an initial browser request to the DFL 160 gt Home Windows Internet Explorer e y http 192 168 10 1 EZS Fila Feit Micra Favewikoc Tanle Halm If the browser does not respond check that
78. l value or to be an educational resource by educational organizations This category is populated by request or submission from various educational organizations Examples might be e highschoolessays org www learn at home com Category 27 Advertising A web site may be classified under the Advertising category if its main focus includes providing advertising related information or services Examples might be www admessages com e www tripleclick com Category 28 Drugs Alcohol A web site may be classified under the Drugs Alcohol category if its content includes drug and alcohol related information or services Some URLs categorized under this category may also be categorized under the Health category Examples might be e www the cocktail guide com e www stiffdrinks com 59 4 6 2 The Content Categories Chapter 4 The Firewall Menu Category 29 Computing IT A web site may be classified under the Computing IT category if its content includes computing related information or services Examples might be e www purplehat com e www gnu org Category 30 Swimsuit Lingerie Models A web site may be categorized under the Swimsuit Lingerie Models category if its content includes information pertaining to or images of swimsuit lingerie or general fashion models Examples might be e www vickys secret com e sportspictured cnn com features 2002 swimsuit Category 31 Spam A web site may be classified und
79. le downloads for viruses The downloads scanned are those that pass through the WAN interface The page in the web interface for Anti Virus scanning is divided into 3 sections A Anti Virus Database B Anti Virus Scanning C Scan Exclusion Control A Anti Virus Database This section of the interface shows the current status of the virus database which is discussed previously in this section B Anti Virus Scanning This part of the interface is where virus scanning is enabled Any combination of the ATTP FTP SMTP or POP3 protocols can be selected If none is selected no virus scanning will take place C Scan Exclusion Control It is possible to explicitly exclude some file types from virus scanning Virus scanning takes up processing resources so expanding this list can help increase throughput Some filetypes are excluded by default Remove per When using the Add button the filetype should not have a leading period In other words if adding PDF files specify pdf and not pdf File Type Checking Some viruses can try to hide inside files by using a misleading name For example a file might pretend to be a pdf file by using the name myfile pdf but actually contain a virus If pdf files are on 62 4 7 Anti Virus Chapter 4 The Firewall Menu the exclusion list such a file might not be scanned To avoid this situation NetDefendOS always performs MIME checking where it looks inside the file to determine what the
80. led An example is shown below with the first three hours of Monday checked D 3 6 9 12 15 18 21 Monday MMMMODODODODODODODDODDODooO A range of dates can also be specified If no range is specified then the schedule will apply continuously once it is associated with a feature Start Date m End Date moemoe Adding Comments 67 4 9 Schedules Chapter 4 The Firewall Menu The comments field allows some text explanation to be added to the schedule It serves only as a reminder to the administrator what the schedule was intended for 68 4 9 Schedules Chapter 4 The Firewall Menu 69 Chapter 5 The Tools Menu e Ping page 70 M5 The Tools menu provide access to features which can be helpful in overall system operation PING The sections that follow describe the options in this menu in the order they appear 5 1 Ping The ICMP ping protocol provides a simple query response tool to determine if a particular network component is alive A ping request ask the question are you there on a given IP address and the response is either yes I am or there is no response and the request times out The ping page in the NetDefendOS web interface provides a simple way to issue a ping command to any IP address and also to repeat the ping request a certain number of times with a certain size of packet The image below shows the ping dialog while waiting for a response IP Address f1
81. llowed However the opposite is never true connections initiated by hosts on the DMZ network are never allowed to the LAN network This arrangement prevents a host that becomes infected on the DMZ spreading the problem to the LAN network Specifying Custom Traffic By clicking the Custom Traffic tab and then selecting Add gt Custom Traffic it is possible to allow through a protocol not specified in the pre defined list 40 4 1 Outbound LAN Traffic Options Chapter 4 The Firewall Menu Custom Traffic For a custom protocol it is necessary to specify if the protocol uses TCP or UDP connections or both and to specify the port number the protocol will try and connect to at the other end of the connection Protocol Specifies whether this service uses the TCP or UDP protocol or both Port s Specifies the destination port s of the traffic to be allowed Schedule The schedule defines when the specified traffic should be allowed Specifying a Schedule A named Schedule can be defined through the Firewall gt Schedules menu option and this can then be used with any individual protocol allowed for outgoing traffic from the LAN interface Schedules specify a period of time when a particular selection is valid For example the administrator might decide to not allow web surfing during working hours The HTTP and HTTPS protocols could then have the appropriate schedule associated with them to achieve this More details can b
82. matically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 192 Subnet mask 255 Default gateway 192 Obtain DNS server address automatically Use the following DNS server addresses Preferred DNS server 192 Alternate DNS server The assigned IP address 792 168 10 30 could infact be another address from the 792 168 10 0 24 network However 792 168 10 30 is normally used by D Link as a convention 115 Appendix C Apple Mac IP Setup An Apple Mac can be used as the management workstation for setup of a DFL 160 Usually configuration of the IP address of the MAC s chosen Ethernet interface should not be needed since the DFL 160 automatically assigns the address using DHCP If DHCP cannot be used the workstation IP address should be configured manually The steps to do this with MacOS X are as follows 1 Goto the Apple Menu and select System Preferences 2 BH oe YD Appearance Desktop 4 Screen Saver Hardware o O M Bluetooth CDs amp DVDs Displays Internet amp Network 2 Click on Network Expos amp Spaces Q X Energy Saver Sharing Update 3 Select Ethernet from the left sidebar menu Keyboard Print amp Fax International Security Spotlight o ma 4 Select M
83. mode NetDefendOS works out from the traffic itself which networks can be found on the interfaces and creates the necessary entries in its routing table If both the LAN and DMZ interfaces have transparent mode enabled traffic will flow transparently between all 3 of the DFL 160 interfaces C DHCP Server Settings With this option enabled a range of IP addresses can be allocated which can then be allocated out to hosts on the network as they are needed The presentation of the server options in the web interface is shown below Enable DHCP Server DHCP IP Address Range to Addresses within the DMZ subnet DHCP Lease Time minutes In most scenarios the DMZ network will be an internal network that does not require public IP addresses However if a range of public IP addresses are allocated by the ISP these could also be allocated using this feature NetDefendOS also allows a DHCP Reservations list to be created These bind a certain IP address with a particular MAC address When a request for a DHCP lease is received on the interface NetDefendOS checks the MAC address of the requesting DHCP client against the list If a match is found the IP address that has been associated with the MAC address is the one that is handed out The screenshot below shows how this option appears in the web interface Combinations of IP address and MAC address can be added to the list The red icon on the right of each entry can be clicked to delete
84. n below can be found in the initial display screen which is described in Section 6 1 System Status UTM Statistics Top 5 Web Content Filtering Categories UTM Information AV Signatures 4000 Signatures E ae ae a an 06 26 13 ures eer gis 16243 Signatures de Last updated 2008 10 28 08 35 40 Computing IT 209 hits 14 Advertising EN 62 hits 4 Business oriented 50 hits 3 Other 83 hits 6 Total classification count 1444 4 6 2 The Content Categories Below is a list of all the categories used with WCF and with a description of the purpose of each category Category 1 Adult Content A web site may be classified under the Adult Content category if its content includes the description or depiction of erotic or sexual acts or sexually oriented material such as pornography Exceptions to this are web sites that contain information relating to sexuality and sexual health which may be classified under the Health Sites Category 21 Examples might be e www naughtychix com e www fullonxxx com Category 2 News A web site may be classified under the News category if its content includes information articles on recent events pertaining to topics surrounding a locality for example town city or nation or culture including weather forecasting information Typically this would include most real time 54 4 6 2 The Content Categories Chapter 4 The Firewall Menu online news publications and tec
85. nce it may be decided to allow web surfing from clients on the LAN interface only at certain times of the day In this case we would create a schedule that contained the times when surfing is allowed and then associate the schedule with the enabled ATTP option of Outbound LAN Traffic in the Firewall menu options Schedule Usage When creating a schedule the administrator gives the schedule a name and it is then possible to associate the schedule with a feature using the name The principle usage for schedules is to control when certain inbound and outbound traffic services are allowed and this is described further in e Section 4 1 Outbound LAN Traffic Options e Section 4 2 Outbound DMZ Traffic Options e Section 4 3 Inbound Traffic Options Predefined Schedules By default a number of predefined schedules are provided that provide commonly used time arrangements Start date End date Comments NonWorkingHours All hours except Monday to Friday 08 00 17 00 Weekdays Monday to Friday 00 00 23 59 Weekends Saturday and Sunday 00 00 23 59 WorkingHours Monday to Friday 08 00 17 00 Custom Schedules When creating a new schedule a grid of checkboxes is displayed which correspond to each hour in each days of the week 24 times 7 checkboxes The left hand checkbox is the first hour of the day midnight to one o clock and so on Clicking the checkbox indicates that the hour is to a have the associated feature enab
86. nd Warning TCP a 00 50 36 5800001 core 81 216 65 11 25 block_data filename eicar com virusname EICAR Test File virussig EICAR Test File advisoryid AV1 layer7_srcinfo layer7_dstinfo algmod smtp algsesid 1333 origsent 1323 termsent 813 Advisory link 2008 10 30 Notice ANTIVIRUS Tcp lan 10 10 10 10 3212 excluded _file 00 49 33 5800003 core 81 216 65 11 25 allow_data_without_scan filename techsupport 20081030 bd filetype bet layer7_srcinfo layer7_dstinfo algmod smtp algsesid 1328 origsent 3425 termsent 813 2008 10 30 Notice ANTIVIRUS Tcp lan 10 10 10 10 2263 excluded _file 00 34 01 5800003 core 160 68 205 231 80 allow_data_without_scan filename weekend html filetype htm algmod http algsesid 1280 origsent 1071 termsent 84 75 6 3 Anti Virus Status Chapter 6 The Status Menu 6 3 Anti Virus Status This page of the web interface provides the ability to view and filter out the last 500 log messages generated by just the Anti Virus subsystem These same messages can also appear mixed in with other messages in the Logging page in the Status menu described in Section 6 2 Logging Status Log messages are visible in 100 message blocks on the page and tools are also provided for filtering out messages of interest based on various criteria These messages can provide valuable feedback from the Anti Virus system on any files being dropped because of viruses being detected A full description of the Ne
87. nd password supplied by your ISP for PPPoE connection should be entered The Service field should be left blank unless the ISP supplies a value for it If the Dial on Demand option is enabled the PPPoE connection will not be set up until traffic is actually sent C Always Connected Dial on demand Idle Timeout seconds 25 3 2 Internet Connection Chapter 3 The System Menu The Idle Timeout is the length of time with inactivity that passes before PPPoE disconnection occurs if the Dial on Demand is selected DNS servers are set automatically after connection with PPPoE D PPTP Connection With this option the username and password supplied by your ISP for PPTP connection should be entered If DHCP is to be used with the PPTP connection to the ISP then this should be selected otherwise Static should be selected and the static IP addresses supplied by the ISP should be entered If the Dial on Demand option is enabled the PPTP connection will not be set up until traffic is actually sent This works in the same way as described above with a PPPoE connection The Idle Timeout is the length of time with inactivity that passes before PPTP disconnection occurs if the Dial on Demand is selected DNS servers are set automatically after connection with PPTP 26 3 3 LAN Settings Chapter 3 The System Menu 3 3 LAN Settings The settings in this part of the management web interface determine how the DFL 160 s LAN
88. ns in the Firewall menu allow the administrator to control and manage the features of the DFL 160 that are specific to a firewall A firewall as the name suggests is a capability that provides a protective barrier against a range of potential threats that can be transported by the public Internet towards sensitive internal networks OUTBOUND LAN TRAFFIC OUTBOUND DMZ TRAFFIC INBOUND TRAFFIC TENT FILTERING ANTI VIRUS IDP SCHEDULES Using the DFL 160 as a Firewall The firewalling capabilities of NetDefendOS allow the administrator to impose various security restrictions on the traffic flowing through the interfaces of the DFL 160 In summary the firewalling options are e The types of traffic that are allowed to flow between interfaces can be specified and also in what direction they are allowed to flow e Secure VPN connections can be specified for traffic flowing through interfaces e Policies can be set for the URLs to which web surfing is allowed e Anti Virus scanning can be enabled for file downloads Intrusion Detection and Prevention IDP can be enabled to search streams of traffic for threats 39 4 1 Outbound LAN Traffic Options Chapter 4 The Firewall Menu against internal resources e Time schedules can be set up which can be then used to specify the times when security policies are applied e Lists of users that are allowed to access protected resources can be specified The sections th
89. ntication methods agreed upon in the IKE negotiation The flow of events for IPsec can be summarized as follows 47 4 4 1 IPsec Chapter 4 The Firewall Menu IKE negotiates how IKE should be protected IKE negotiates how IPsec should be protected e An IPsec tunnel is established which is used to securely transport data The following sections are used in the web interface for IPsec setup A General B Authentication C Tunnel Type A General Here a textual Name for the tunnel is specified This is used only for identifying the tunnel for management purposes in the web interface The Local Network is the network attached to the LAN or DMZ interface which will communicate through the IPsec tunnel B Authentication This is the Pre shared Key PSK that provides the initial means to set up the tunnel The key should be the same for both end points of the tunnel for communication to succeed A PSK can be any alphanumeric character string Security using digital certificates is not a feature with the DFL 160 C Tunnel Type An IPsec tunnel can be one of two types Roaming Users If clients will be connecting through the tunnel via the WAN port then this option should be enabled If XAuth is required then this means a user must give a username and password listed in the user database see Section 4 5 VPN Users Lan to Lan If the tunnel is being used to connect a remote network on the WAN inte
90. o ICMP ECHO requests on the specified Ping O interface s The recommendation is to restrict the interfaces which allow management access and to always use the ATTPS protocol to ensure that management communication is encrypted The only advantage in using HTTP for management access is to avoid the issue with certificates NetDefendOS sends an unsigned certificate to the browser when using ATTPS and this means there is an extra small step involved to tell the browser to accept the certificate the interaction to do this is slightly different depending on the browser Enabling Ping Requests Another option in the management settings is to determine which interfaces will receive and respond to an ICMP ping request Ping requests are a simple means to establish if a host is alive and consist of a simple sequence of an are you there ping request to an IP address followed by a yes I am response by the host It is often best to disallow responses to ping requests received from the public internet on the WAN interface which is why ping responses on WAN are disabled by default Potential intruders often use pings to scan the internet for potential target IP addresses and it is therefore not recommended to expose the DFL 160s public IP address to this probing For troubleshooting purposes however it may be desirable to temporarily enable ping responses on the WAN interface B Administrator Settings By default the administrator usernam
91. o boost client protection Most importantly it can act as a backup for when local client antivirus scanning is not available The Scanning Mechanism As a file transfer is streamed through the DFL 160 NetDefendOS will scan the data stream for the presence of viruses if the Anti Virus module is enabled Since files are being streamed and not being read completely into memory a minimum amount of memory is required and there is minimal effect on overall throughput The inspection process is based on pattern matching against a database of known virus patterns and can determine with a high degree of certainty if a virus is in the process of being downloaded to a user behind the DFL 160 Once a virus is recognized in the contents of a file the download can be terminated before it completes Types of File Downloads Scanned Anti Virus scanning can scan file downloads associated with the HTTP FTP SMTP and POP3 protocols More specifically e Any uncompressed file type transferred for these protocols can be scanned e If the file has been compressed ZIP and GZIP file downloads will be scanned although the maximum allowed compression ratio is 1 20 if the ratio exceeds this the file will be dropped and logged The reason for the compression ratio limit is that when scanning compressed files NetDefendOS must apply decompression to examine the file s contents Some types of data can result in very high compression ratios where the compressed
92. o prevent other with access to the workstation getting unauthorized access to the DFL 160 Logout by clicking on the Logout link at the top right of the management web interface Automatic Logout Logout will occur automatically after a period of 15 minutes management inactivity and this length 15 2 2 Web Browser Connection Chapter 2 Initial Setup of time is fixed After automatic logout occurs the next interaction with the management web interface will take the browser to the login page Connecting to the Internet In the typical DFL 160 installation the next step is to connect to the public Internet To do this the WAN interface should be connected to your Internet Service Provider ISP This is usually done through other equipment such as a broadband modem The WAN interface is by default configured to use DHCP to automatically fetch the required external IP addresses from the ISP If required detailed WAN interface configuration is done by going to the System gt Internet Connection menu these options are described in Section 3 2 Internet Connection Once a connection to the Internet is established web surfing from clients on networks attached to the LAN interfaces is then possible This is not possible with the DMZ interface since connections on that interface are blocked until they are explicitly allowed Setting Firewall Security Policies A key feature of the DFL 160 product is the ability to act as a fire
93. on and Prevention IDP This option enables NetDefendOS to scan traffic for patterns that indicate attempted network intrusions These are most often directed against internal servers e Web Content Filtering The option enables NetDefendOS to check the URLs requested during web surfing to see if the content type at the URL is allowed by administrator defined policies Activating a Service After buying a subscription to a new service from your D Link distributor or sales office an activation code is received which can then be entered into the license page to activate the service License Properties Each DFL 160 comes pre installed with a standard NetDefendOS license This page of the web interface shows the contents of the current license The license determines the maximum capabilities of the system and the parameters in a license are as follows e Connections This is the number of connections that can exist between interfaces in the NetDefendOS A connection refers to a logical concept in the state engine of the NetDefendOS software A single TCP based transfer can be regarded as a single connections but a UDP based data stream such as used with VOIP data transfers can also be viewed as consisting of a connection The connection restriction can result in limitations on the total number of client users that can be accessing Internet based facilities at the same time e Rules This is the maximum number of P rules that can be creat
94. on those networks to able to reach the public Internet C Categories The administrator adds the categories that are to be blocked from the choices in the left table to the selected list in the right In most cases the category description should be self explanatory Allowed Blocked Dating sites Advertising gt Gambling Health sites Government blocking list Investment sites D Options There are three further options which can be selected when WCF is enabled as shown below Non Managed Action Action to take for content that hasn t been classified Allow users to override a amp estricted Site notice and access blocked content Non Managed Action If a URL is not found in the WCF database and is therefore not classified then the default action is allow access anyway The administrator can decide however to block any unclassified URLs Allow Override With this option a web page is displayed to the user to indicate that they are trying to access a URL which has been flagged by the WCF database There is a link on the page however which allows them to continue on to the URL This option is useful to draw users attention to the fact that their web surfing is being monitored but not is still intrusive enough to totally block their surfing Blocking all flagged URLs in all undesirable categories at once can sometimes result in strong protests from an internal web surfing community and it is therefore often advis
95. ound traffic 44 with outbound dmz traffic 43 with outbound lan traffic 41 self signed browser certificate 14 settings CLI command 109 setup 11 shutdown CLI command 110 spam see content filtering stat CLI command 98 static URL filters 53 stats CLI command 110 status LED 9 13 status menu 72 sysmsgs CLI command 110 system menu 22 system status 73 T technical support 94 techsupport CLI command 111 time CLI command 111 time servers 35 tools menu 70 transparent mode with DMZ interface 30 with LAN interface 27 troubleshooting 98 troubleshooting setup connection 18 U uarules CLI command 111 unpacking 11 update center 87 updatecenter CLI command 111 upgrades 93 urlcache CLI command 112 USB port 20 userauth CLI command 112 user authentication status 83 user database 51 userdb CLI command 112 W WAN interface 7 web content filtering 52 categories 54 status 77 wildcarding in URLs 53 windows workstation setup 114 V virtual private networks see VPN VPN 46 IPsec 47 L2TP 49 user authentication database 51 121 Appendix Product Statement FCC EMI for Class B Statements FCC Interference Information This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful inter ference and 2 This device must accept any interference received including interferenc
96. ows between the trusted inside networks and the much more threatening public Internet that lies outside The outside Internet network is connected to the DFL 160 s WAN interface and the trusted inside network is connected to the LAN interface As explained later there are in fact 4 LAN interfaces connected together through an internal switch The network connected to the DMZ interface can be considered to also be inside but it is designed for a network where servers are situated which are accessed by external hosts and users on the public Internet The DMZ therefore represents a place where threats such as server viruses can be isolated and kept separate from the more sensitive LAN network For this reason connections initiated from hosts and users on the DMZ network to the LAN network are never allowed Firewalling and UTM NetDefendOS provides the NetDefend SOHO UTM product with the following important features to protect against external threats coming from the Internet e Extensive Firewalling Capabilities NetDefendOS can block traffic which does not comply with security policies defined by the user These policies can target traffic according to which protocol such as HTTP or FTP is arriving and leaving and by which interface as well as optionally determining when such traffic is allowed according to a time schedule There are three sets of basic traffic flow policies that can be defined 1 Traffic initiated by internal ne
97. ozens of events for which event messages can be generated The events range from high level user events down to low level system events The conn_open event for instance is a typical high level event that generates an event message whenever a new connection such as a TCP IP link is established An example of a low level event would be the startup_normal event which generates a mandatory event message as soon as the system starts up All event messages have a common format with attributes that include category severity and recommended actions These attributes enable easy filtering and analysis of messages either within NetDefendOS or on an external SysLog server A list of all event messages can be found in the DFL 160 Log Message Reference Guide That guide also describes the design of event messages the meaning of severity levels and the various attributes available The severity of each event is predefined and it can be in order of severity one of 1 Emergency the most severe 2 Alert 3 Critical 4 Error 5 Warning 6 Notice 7 Info 8 Debug By default all messages of severity Info and above are sent The Debug category of messages is designed for troubleshooting only and are only used when troubleshooting a problem Logging Options The Logging page of the web interface is divided into three option sections A Syslog Settings B Audit Logging C Email Alerts A Syslog Settings Syslog is a log message
98. put could consist of a large number of lines of output the web interface provides the ability to impose a filter on the output so only those lines that are of interest are displayed Where a large number of lines could be displayed the convention in the web interface is to break these into 100 entry blocks and to have available up to 500 entries in total Status Screens are a Snapshot It should also be kept in mind that the status screens are providing a snapshot of the system status and history at a given point in time In many screens a Refresh button is provided to force the status display to be updated The sections that follow describe the options in this menu in the order they appear 72 6 1 System Status Chapter 6 The Status Menu 6 1 System Status The System Status page is the default page that is shown when the web interface opens after logging in to NetDefendOS as administrator The status display is divided into three parts A System Resources B UTM Statistics C Log History A System Resources Various graphical displays and numerical values show the current status of the DFL 160 system and how its resources are being used System Resources System Information CPU Load Throughput Model 200Mbps DFL 160 scr System Time 100Mbps 2008 10 30 00 28 19 50Mbps Uptime 0 days 00 58 06 h 1h T 2h 1h ra Configuration Version 10 Firmware Version 2 25 00 04 9048 Oct 24 2008 Last Restart 2
99. puters since it offers efficient and inexpensive communication The requirement therefore exists for data to traverse the Internet to its intended recipient without another party being able to read or alter it VPN allows the setting up of a tunnel between two devices known as tunnel endpoints All data flowing through the tunnel is then secure The mechanism that provides tunnel security is encryption There are two common scenarios where VPNs are used 1 LAN to LAN connection Where two internal networks need to be connected together over the internet In this case each network is protected by an individual DFL 160 and the VPN tunnel is set up between them D N J co AS NS 2 Client to LAN connection Where many remote clients need to connect to an internal network over the internet In this case the internal network is protected by the DFL 160 to which the client connects and the VPN tunnel is set up between them 46 4 4 1 IPsec Chapter 4 The Firewall Menu In summary a VPN allows the public Internet to be used for setting up secure communications or tunnels between DFL 160s or between a DFL 160 and other security gateway devices or clients VPN with the DFL 160 NetDefendOS supports setting up tunnels using the following types of tunnel protocols for secure communication e IPsec tunnels L2TP tunnels Using L2TP tunnels the DFL 160 can either be 1 An L2TP client which connects to an L2T
100. r D Link own time servers e Public time servers The details of D Link s own time servers are built into NetDefendOS and this option only has to be enabled for the servers to be used If public time servers are used the details for server access have to be entered manually and it recommended that more than one is defined for redundancy O Disabled g D Link pre configured timesync server Custom Primary Time Server e E g dns ntp domain corn Secondary Time Server A optional 35 3 6 Date and Time Chapter 3 The System Menu When usage of time servers is enabled NetDefendOS will poll them on a regular basis and then adjust the DFL 160 system clock with the exact time If the time server and the current time differ by more than one hour 60 minutes then the time server is ignored 36 3 7 Dynamic DNS Settings Chapter 3 The System Menu 3 7 Dynamic DNS Settings A DNS feature offered by NetDefendOS is the ability to explicitly inform DNS servers when the external IP address of the DFL 160 has changed This is sometimes referred to as Dynamic DNS DDNS and is useful where the DFL 160 has an external IP address that can change By enabling this option NetDefendOS acts as a dynamic DNS client and every time it restarts it will send a message so the dynamic DNS server is informed of the current IP address on the WAN interface This messaging is also repeated at set intervals during normal opera
101. r of the two values Possible values in the State column include SYN_RECV TCP packet with SYN flag received SYNACK_S TCP packet with SYN ACK flags sent ACK_RECV TCP packet with ACK flag received TCP_OPEN TCP packet with ACK flag sent FIN_RECV TCP packet with FIN RST flag received PING The connection is an ICMP ECHO connection UDP The connection is a UDP connection RAWIP The connection uses an IP protocol other than TCP UDP or ICMP Syntax connections Example DFL 160 gt conn State Prot Source Destination Time TCP_OPEN TCP wan 60 20 37 6 5432 dmz wwwsrv 80 3600 SYN_RECV TCP wan 60 20 37 6 5433 dmz wwwsrv 80 30 UDP ORIN UDP lLamsilO 5 3 235433 OMA OMS SS SC o ea ln Crashdump 102 Dconsole Appendix A CLI Reference Displays the contents of the file crashdump dmp stored by NetDefendOS The file contains critical diagnostic information which can help determine the reason for a critical system event Syntax crashdump Dconsole DHCP Displays a list of event information that is useful in pinpointing the occurrence of critical system errors Syntax dconsole Syntax dhcp options lt interface gt Options renew Force interface to renew its lease release Force interface to release its lease Example DFL 160 gt dhcp renew wan DHCPServer DNS Show the contents of the DHCP server configuration section and active DHCP leases Syntax dhcpserver opt
102. re that is designed to detect and neutralize such intrusion attempts When IDP is enabled it functions by monitoring network traffic as it passes through the DFL 160 s WAN interface from the public Internet searching for patterns that indicate an intrusion is being attempted When such a pattern is detected NetDefendOS IDP can then neutralize the attempt by dropping the traffic containing the threat The IDP Database and Subscribing NetDefendOS IDP uses a locally held database of threat patterns which is routinely updated by downloads from external D Link servers with the latest threat information as they become available NetDefendOS IDP is a subscription based service and yearly subscriptions can be purchased from your local D Link agent After purchase you will receive a code which is then used for activating IDP 64 4 8 IDP Options Chapter 4 The Firewall Menu Ay 7 Ax fax lar WY 3 2 m ha 3 arm j 5 D4 ted MA Enabling IDP for a Protocol The IDP page of the NetDefendOS web interface lists a set of protocols which can be scanned by the IDP subsystem Selecting any of the protocols switches on IDP scanning Dropping Connections or Only Logging When IDP is enabled the administrator has two options for how detected intrusions are dealt with e Log only e Log and drop connection The Log only option can be useful to first examine what traffic IDP would block if it was fully enabled Select the
103. rence ARPExpireUnknown Ses ARPMulticast DropLog ARPBroadcast DropLog ARPCacheSize 2 4096 ARPHashSize 3 512 ARPHashSizeVLAN 64 Shutdown Instructs NetDefendOS to perform a shutdown in a given number of seconds It is not necessary to perform a shutdown before the system is powered off Syntax shutdown lt seconds gt If the lt seconds gt parameter is not specified then the default value is 5 seconds Options normal Perform a normal shutdown the default reboot A reboot occurs automatically Example DFL 160 gt shutdown Shutdown NORMAL Active in 5 seconds Shutdown reason Shutdown due to console command Stats Shows various vital stats and counters Syntax stats Example DFL 160 gt stats Uptime Last shutdown CPU Load Connections Fragments Buffers allocated Buffers memory Fragbufs allocated Fragbufs memory Out of buffers Sysmsgs 10 days 238113395 20081006 165419222 6 AQIS Che Oi 32168 17 Out Ose 1024 0 Lia eras 1252 MASIA AZ S OZ iis 16 16 x 10040 156 KB 0 Show the contents of the OS sysmsg buffer Syntax sysmsgs Example DFL 160 gt sysmsg Contents of OS sysmsg buffer 2003 04 24 00 03 46 Boot device number is 0x80 2003 04 24 00 03 46 Available LowPoolMemory 360424 Bytes 110 Techsupport Appendix A CLI Reference LBlock 360424 bytes 003 04 24 00 03 46 Available KernelPoolMemory 1048560 bytes LBlock
104. rface to a local network on the LAN or DMZ The tunnel s remote endpoint may require XAuth authentication in which case a valid username and password must be specified Note If fully qualified DNS names FQDN are used for example gw domain com then the prefix dns must be used when these are entered For this example dns gw domain com a DNS server must also be configured either manually or automatically for resolution to an IP address to succeed Listing IPsec Tunnels 48 4 4 2 L2TP PPTP Client Chapter 4 The Firewall Menu Currently established IPsec tunnels can be listed and their usage examined through the Psec option in the Status menu see Section 6 8 IPsec Status 4 4 2 L2TP PPTP Client This option allows a tunnel to be set up where the DFL 160 acts as a L2TP or PPTP client In this mode a tunnel is set up where the DFL 160 connects to an L2TP or PPTP server In this mode users and hosts on the DFL 160 LAN and DMZ interfaces can connect securely to resources at the other end of the tunnel Unlike pure IPsec VPN where separate VPN tunnels are set up for each user or host only one L2TP tunnel is set up and all traffic flows through it The following sections appear in the web interface for setup A General B Authentication C IPsec Encryption D Security Authentication E MPPE F Dial on Demand A General In this section the tunnel is named and the protocol L2TP or PPTP is chosen T
105. riod of time when a particular selection is valid For example the administrator might decide to not allow web surfing during working hours The HTTP and HTTPS protocols could then have the appropriate schedule associated with them to achieve this More details can be found in Section 4 9 Schedules 43 4 3 Inbound Traffic Options Chapter 4 The Firewall Menu 4 3 Inbound Traffic Options This set of NetDefendOS options deals using firewalling to protect against inbound traffic The term inbound refers to connections that are initiated from the public Internet on the WAN interface These connections are typically made to access some resource that sits behind the DFL 160 such as an HTTP server that is sitting on the DMZ network By default NO SUCH CONNECTIONS ARE ALLOWED and the administrator must explicitly allow individual protocols by ticking one or more of the checkboxes on this page of the web interface This page of the web interface is divided into 3 parts A Inbound Traffic B Inbound Multicast C Custom Traffic A Inbound Traffic A pre defined list is displayed on this page of all the most common protocols Ticking the checkbox against a protocol name means that inbound traffic of just that protocol type will be allowed through The presentation of the first few checkboxes in the web interface is shown below Service Enable Server IP Schedule Details The IP address for each service must be entered
106. rsessrrrrerreersrrerreresrrererreeesne 40 4 2 Outbound DMZ Traffic Options oocooccccccnccnnccnnconnconnccnncnnnconncnnncnnccnnrcnicnnn 42 4 3 Inbound Traffic Options coooccnccnnccnncnnncnnccnnccnnccnnccnnccnnconncnnncnnnrnnncnnrcnancnns 44 4A VPN Options stes rd aaa rios dns 46 4AT OSO 47 4 4 2 L2TP PPTP Cent coast geese snsese sotea des tonos voamecaeedtpteagsesaeey 49 4 4 3 L2TP PPTP Server oisi eero e ee E EEE E EOE E TEES 50 4D VPN USES a EEEE 51 4 6 Web Content Filtering sopone sscnres testi e E E EE oE E REE 52 4 62 Opus veris oes A E E E E E tie EE E E as ETEA 52 4 6 2 The Content Categories 2 0 0 0 cece A EE ceca cece SE E RNE 54 AT A nE AO 6l 4 8 IDP ODIONS isoen ee a e Ar E E E A EA E stan E pi 64 49 Schedule Serre aniar n r e E E E EE E NTA 67 Y Lhe Fools Menu staer ee A E E E E E E ER 70 Dd PING is aren A E EEE E N EE EE SEERE E EEE spect 70 6 The Status Mena Ras E E drid dress 72 6 1 System Status eurillos as 73 6 2 Logging Status e ccsesssszactedsttaets sabtete sis setae ssa ogtiudss eae aE T E E 75 6 3 Ant VITUS Status detona t 76 6 4 Web Content Filtering Status 2 0 0 ceee cece eeca seca eee eeea seen een eeae esas TI 6 5 LDP A ON 78 6 6 Connections Stat s seos ida adi di EER TSE ad cia 79 077 Interfaces Status cit ea aiii ben ne 80 6 8 AP SECAS id A A A Aaa 82 6 9 User Authentication Status ooccoccoconcnnconcnnconcnncnnconcnnconcnnroncnnroncnnroncnaronnns 83 OO
107. s required will also need to find a DNS server These DNS servers should be configured if they have not been automatically when connecting to an ISP B Mode There are three modes that are available with the LAN interface The presentation of the mode options in the web interface is shown below Use NAT Mode default Network Address Translation should be enabled unless the LAN uses public IP addresses In Router Mode NAT is disabled and clients on the internal networks need to O Use Router Mode be routable from the WAN interface Local clients use this device as default gateway In Transparent Mode the firewall can easily be deployed in an already O Use Transparent Mode established environment without any need for changing the configuration of the present network devices 27 3 3 LAN Settings Chapter 3 The System Menu NAT Mode This mode enables Dynamic Network Address Translation NAT use between the LAN and WAN interfaces This means that the individual IP addresses of hosts on the LAN interface will be hidden from the public internet All traffic coming from the public Internet to LAN hosts will be directed to the public IP address of the WAN interface and NetDefendOS will perform the necessary IP address translation Enabling NAT is a recommended way to shield the users and hosts on the LAN network from outside attack It also means that a DFL 160 requires just a single public IP address to be allocated by t
108. sages can provide valuable feedback from the IDP system on what kinds of threats are being detected A full description of the NetDefendOS IDP feature can be found in Section 4 8 IDP Options 78 6 6 Connections Status Chapter 6 The Status Menu 6 6 Connections Status A connection in NetDefendOS refers to either a normal TCP IP connection set up to perform a transfer of data or a UDP packet based connection where a stream of packets is being sent from a sender to a receiver such as in a streaming video transfer This page of the web interface shows the currently established connections The list shows the protocol TCP or UDP the source IP address and the destination IP address of the connection A example of the information displayed is shown below State table contents max 100 entries State Proto Source Destination Timeout RAWIP ESP vran 10 6 200 3 0 core 10 6 28 160 0 129 PING ICMP lan 192 168 1 11 1280 core 192 168 1 1 1280 7 UDP UDP lan 192 165 1 100 123 vran 207 46 197 32 123 UDP UDP core 0 0 0 0 0 core 10 6 28 160 1701 UDP UDP core 10 6 28 160 1701 lPsec_RemoteUsers_WinXP 10 6 200 3 1701 UDP UDP RemoteUsers_WinXP 192 168 1 150 137 wan 255 255 255 255 137 FIN_RCVD TCP core 10 6 28 160 29947 wan 10 6 0 17 80 FIN_RCVD TCP lan 192 168 1 100 1141 core 10 6 0 17 80 UDP UDP lan 192 165 1 100 1025 vran 192 168 1 1 53 FIN_RCVD TCP lan 192 168 1 100 1139 core 10 6 0 17 80 FIN_RCVD TCP lan 192 168 1 100 114
109. t dconsole This can be abbreviated to gt dcon The dconsole command provides a list of important events in NetDefendOS operation and can help to establish the date time and nature of events leading up to a serious problem occurring The output might look similar like the following Showing diagnose entries since 2008 05 22 Z0O8 O6 2i1 1154 58 ST 22508 L31 20080621 1356316 Stop RECONFIGURE 20080021 1156521 Site anata 2 2908 LL 2008 0021 1257329 Stop RECONFIGURE 2008 0621 alile sesh Scarce 2 25 08 i131 20068 06 21 1113599345 Stop NORMAL dconsole output above may include a dump of the system memory in the case of serious runtime errors This will look similar like the following Reason Exception DataAbort occurred at address 0x aaea34 Generation date time 2008 07 04 14 23 56 List of loaded PE modules moeder 0704 DAs Os O1OM0 OOOO EPs Osc OMOMOZ 8 Soc ISS 000 fwcore 82 25 2336 BA 0x07761038 EP 0x0007c630 Register dump 0 s OxSeilaOOOSe wil 3 OxOVeGSscle 2 3 000000004 zS 8 050013700 j 3 OOO 7G OAR sn 3 0075307140 120 lt 0xX0Os0celis 167 s OOOO OOOOOF ie E 0x0790Sa 9e 29 OxXOSVEESILIES lOs OXOOOOOOOO lle 0 07 Wires r12 0x00000004 sp 0x0775fcec lr 0x079de7e4 Stack dump 5da89306 c33613f4 e330ctes 04411507 45515a49 86619f8b cOdb0a81 4e395861 cb25b796 e3108934 932766c5 4dcff e9 711c3463 bIcd5dle 52149961 9324dea3 d340dc25 15458610 63582ded 689a0c54 dfb43131 02c
110. t unauthorized access How to do this is described in Chapter 8 The Console Boot Menu About Display information about the version of NetDefendOS currently running on the DFL 160 Syntax about ARP Displays ARP entries for the specified interface s Published static as well as dynamic items are shown Syntax arp options lt interface pattern gt Options ip lt pattern gt Display only IP addresses matching lt pattern gt hw lt pattern gt Display only hardware addresses matching lt pattern gt num lt n gt Display only the first lt n gt entries per iface default 20 hashinfo Display information on hash table health flush Flush ARP cache of ALL interfaces flushif Flush ARP cache of an iface Example DFL 160 gt arp wan ARP cache of iface wan Dynamic 194 2 1 1 0020 d216 5eec Expire 141 ARPSnoop Toggles the on screen display of ARP queries This command can be of great help in configuring the hardware since it shows which IP addresses are heard on each interface Syntax arpsnoop lt interface pattern gt Toggle snooping on given interfaces Syntax arpsnoop all Snoop all interfaces Syntax arpsnoop none Disable all snooping 100 Buffers Appendix A CLI Reference Example DFL 160 gt arpsnoop all ARP snooping active on interfaces lan wan dmz ARP on wan gw world requesting wan_ip ARBOL wo See oe eee ques tan qlo Buffers This command can
111. tDefendOS Anti Virus feature can be found in Section 4 7 Anti Virus 76 6 4 Web Content Filtering Status Chapter 6 The Status Menu 6 4 Web Content Filtering Status This page of the web interface provides the ability to view and filter out the last 500 log messages generated by just the Web Content Filtering WCF subsystem These same messages can also appear mixed in with other messages in the Logging page in the Status menu described in Section 6 2 Logging Status Log messages are visible in 100 message blocks on the page and tools are also provided for filtering out messages of interest based on various criteria These messages can provide valuable feedback from the WCF subsystem on the surfing habits of internal users and which URL accesses are being denied A full description of the NetDefendOS Web Content Filtering feature can be found in Section 4 6 Web Content Filtering 77 6 5 IDP Status Chapter 6 The Status Menu 6 5 IDP Status This page of the web interface provides the ability to view and filter out the last 500 log messages generated by just the IDP subsystem These same messages can also appear mixed in with other messages in the Logging page in the Status menu described in Section 6 2 Logging Status Log messages are visible in 100 message blocks on the page and tools are also provided for filtering out messages of interest based on various criteria These mes
112. tain Everything Backups include only static information from the NetDefendOS configuration Dynamic information such as the DHCP server lease database or Anti Virus IDP databases will not be backed up Operation Interruption Backups can be created at any time without disturbing NetDefendOS operation After restoring a backup it is necessary to perform an Activate to make the restored configuration system active Restoring and activating a configuration only backup should not in most cases disturb system operation Complete system restore however is more involved and will require that NetDefendOS reinitializes with the loss of all existing connections Initialization may require some seconds to complete depending on the hardware type and normal operation will not be possible during this time 91 7 4 Reset to Factory Defaults Chapter 7 The Maintenance Menu 7 4 Reset to Factory Defaults Reset Through Software A restore to factory defaults can be applied so that it is possible to return to the original hardware state that existed when the DFL 160 was shipped by D Link When a restore is applied in this way all configuration data is lost and the IDP and Ant Virus databases are lost which means they must be reloaded Performing a Reset Manually An alternative way to reset the DFL 160 is to push in the reset button at the rear of the unit for 10 to 15 seconds while powering it on After that release the reset button and t
113. the entry 31 3 4 DMZ Settings Chapter 3 The System Menu IP Address Host s IP address MAC Address Ethernet MAC address e g 12 34 56 78 ab cd IP Address MAC Address 192 168 10 110 00 10 4B 99 04 83 192 168 10 111 00 10 4B 99 26 A0 192 168 10 112 00 02 E3 55 27 4B This feature allows the same IP address to be always allocated to a particular DHCP client Transparent Mode and the Interface IP Address There are some considerations that should be noted with the DMZ IP address when transparent mode is enabled e In transparent mode the DMZ interface will take on the same IP address as the WAN interface e If DHCP is enabled on the WAN interface and the IP address on WAN cannot be refreshed within its DHCP lease time then it will receive the IP address 0 0 0 0 and the DMZ interface will also receive this IP address As a result the administrator cannot connect through the DMZ interface to perform management tasks with a browser while the DMZ has the 0 0 0 0 IP address These IP address considerations are also true if transparent mode is enabled on the LAN interface 32 3 5 Logging Chapter 3 The System Menu 3 5 Logging NetDefendOS Log Messages During NetDefendOS operation log messages are routinely generated to indicate when certain events occur These messages form an important audit trail that show what has occurred during system operation and can dealt with in various ways There are d
114. the steps for accessing a DFL 160 for the first time through a web browser The user interface accessed in this way is known as the NetDefendOS Web Interface or WebUI 1 Connect the Cables The DFL 160 and a management workstation typically a Windows PC running a web browser should be physically connected together so they are on the same Ethernet network A connection can be made directly using a crossover Ethernet cable or by connecting the management workstation and the firewall to the same switch One of the four LAN interfaces should be attached to the same Ethernet network as the management workstation or a network accessible from the workstation via one or more routers Typically the connection is made via a switch or hub in the network but can instead be done directly using a regular straight through Ethernet cable For Internet connection the WAN interface should be connected to your ISP 2 Setting the Workstation Interface IP Address Traffic will be able to flow between the designated workstation interface and the DFL 160 LAN interface because they are on the same IP network If DHCP is enabled on the workstation and this is usually the default or DHCP is enabled on the device such as a router via which the connection is made then the workstation should not need further configuration IP addresses are assigned automatically with DHCP and the reader can skip to step 3 If for some reason DHCP is not available then manua
115. the types of web surfing allowed by clients on the LAN or DMZ When web browsers try to access a URL on the public Internet through the WAN interface NetDefendOS checks the URL against a D Link URL database to find out what category it is For instance a URL for web site like CNN might belong to the News category The administrator can set up policies to determine what categories are permitted or denied for web surfing A company s internal surfing policy might be for example to only allow access to news and e banking sites but not to any other type of site 3 a SS Se for _ eb _ gt SA rs eN ZA ra x rg py 3 gt 5 ome y pj 2a 1 l i ae j a A tal The sections of the WCF page in the web interface are A Subscription B Web Content Filter C Categories D Options E URL Filters A Subscription WCF is a subscription based service and a one year subscription can be purchased as a license add on from your D Link agent The buy license link here will open a D Link window in your browser so that you can find your local agent Alternatively you can click the link here http security dlink com tw wheretobuy asp 52 4 6 1 Options Chapter 4 The Firewall Menu B Web Content Filter The option here is to enable or disable web content filtering Note that HTTP and HTTPS traffic or all traffic should be allowed in the outgoing traffic options for the LAN or DMZ interfaces for clients
116. the web browser does not have a proxy server configured For possible problems with the network connection consult Section 2 3 Browser Connection Troubleshooting B Using HTTPS To connect with the added security of HTTPS instead enter https 192 168 10 1 in the browser gt Home Windows Internet Explorer a k J https 192 168 10 1 ISS Fila Feit Miam Favnarikar Tanle Halm When responding to an https request NetDefendOS sends a self signed certificate which will not be initially recognized so it will be necessary to tell the browser to accept the certificate for this and future sessions Different browsers handle this in slightly different ways For example in Microsoft Internet Explorer the following error message will be displayed in the browser window y There is a problem with this website s security certificate To continue tell the Windows IE browser to accept the certificate by clicking the following link which appears near the bottom of the browser window Y Continue to this website not recommended In FireFox this procedure is called Add a security exception and is a similar process of telling the browser to accept the unsigned certificate 5 Logging on to the DFL 160 NetDefendOS will next respond like a web server with the initial login dialog page as shown below 2 2 Web Browser Connection Chapter 2 Initial Setup PLEASE ENTER YOUR USERNAME AND PASSWORD Username admin P
117. those features after a software upgrade 20 2 4 Console Port Connection Chapter 2 Initial Setup 21 Chapter 3 The System Menu e Administration page 22 e Internet Connection page 25 e LAN Settings page 27 e DMZ Settings page 30 e Logging page 33 e Date and Time page 35 e Dynamic DNS Settings page 37 a SYSTEM E The System menu options allow the administrator to control and manage essential operating settings of the DFL 160 ADMINISTRATION INTERNET CONNECTION LAN SETTINGS TTINGS DATE AND TIME DYNAMIC DNS SETTINGS The sections that follow describe the options in this menu in the order they appear 3 1 Administration The options on this page deal with administrator access to the DFL 160 through one of the Ethernet interfaces The page is divided into 3 sections A Management Settings B Administrator Settings C Management Ports A Management Settings The principal purpose of these settings are to determine with which protocol and on what interfaces the administrator can manager the DFL 160 through a web browser using the web interface 22 3 1 Administration Chapter 3 The System Menu WAN LAN DMZ ros Allow HTTP access to the web user interface HTTP is unencrypted and passwords are sent in clear text Allow HTTPS access to the web user interface HTTPS is an encrypted and HTTPS O O secure protocol HTTP E Allow the firewall to respond t
118. tion The htipposter CLI Command The CLI console command httpposter can be used to troubleshoot problems by showing what NetDefendOS is sending and what a server is returning during dynamic DNS lookup All CLI commands are documented in Appendix A CLI Reference Usage in VPN Scenarios Dynamic DNS can also be useful in VPN scenarios where both ends of the tunnel have dynamic IP addresses If only one side of the tunnel has a dynamic address then the NetDefendOS VPN keep alive feature solves this problem Note Dynamic DNS services are often sensitive to repeated logon attempt over short periods of time and may blacklist IP addresses that are sending excessive requests It is therefore not advisable to query these services too often otherwise they may cease to respond The D Link DDNS Server D Link offers its own DDNS server which is a free service for D Link customers Registration is required and can be done by going to https www dlinkddns com login This service is recommended but one of the other pre defined services could be used instead 37 3 7 Dynamic DNS Settings Chapter 3 The System Menu 38 Chapter 4 The Firewall Menu e Outbound LAN Traffic Options page 40 e Outbound DMZ Traffic Options page 42 e Inbound Traffic Options page 44 e VPN Options page 46 e VPN Users page 51 e Web Content Filtering page 52 e Anti Virus page 61 e IDP Options page 64 e Schedules page 67 NT The optio
119. tisement of goods or services to be exchanged for money and may also include the facilities to perform that transaction online Included in this category are market promotions catalogue selling and merchandising services Examples might be e www megamall com e www buy alcohol se Category 7 Entertainment A web site may be classified under the Entertainment category if its content includes any general 55 4 6 2 The Content Categories Chapter 4 The Firewall Menu form of entertainment that is not specifically covered by another category Some examples of this are music sites movies hobbies special interest and fan clubs This category also includes personal web pages such as those provided by ISPs The following categories more specifically cover various entertainment content types Pornography Sex 1 Gambling 4 Chatrooms 8 Game Sites 10 Sports 16 Clubs and Societies 22 and Music Downloads 23 Examples might be www celebnews com e www hollywoodlatest com Category 8 Chatrooms A web site may be classified under the Chatrooms category if its content focuses on or includes real time on line interactive discussion groups This also includes bulletin boards message boards online forums discussion groups as well as URLs for downloading chat software Examples might be e www thetalkroom org e chat yazoo com Category 9 Dating Sites A web site may be classified under the Dating Sites category i
120. true filetype of the data is Only if the filetype determined by MIME checking is on the exclude list is virus scanning skipped 63 4 8 IDP Options Chapter 4 The Firewall Menu 4 8 IDP Options The Intrusion Threat Computer servers can sometimes have vulnerabilities which leave them exposed to attacks carried by network traffic Worms trojans and backdoor exploits are examples of such attacks which if successful can potentially compromise or take control of a server A generic term that can be used to describe these server orientated threats are Intrusions Intrusion Detection Intrusions differ from viruses in that a virus is normally contained in a single file download and this is normally downloaded to a client system An intrusion manifests itself as a malicious pattern of Internet data aimed at bypassing server security mechanisms Intrusions are not uncommon and they can constantly evolve since their creation can be automated by the attacker With the DFL 160 servers that are accessed from the public Internet are typically situated on the network connected to the DMZ interface This provides one form of defense against intrusions by isolating any server infection away from the most sensitive inside network which is usually connected to the LAN interface However it is much better to take steps to prevent these infections ever occurring The IDP Solution Intrusion Detection and Prevention IDP is a NetDefendOS featu
121. tworks outbound traffic 2 Traffic initiated by external networks to hosts and users on the LAN network inbound LAN traffic 3 Traffic initiated by external networks to hosts and users on the DMZ network inbound DMZ traffic Note When a DFL 160 is started for the first time no inbound traffic is allowed so the administrator should decide what inbound traffic will be allowed as one of the first setup steps e Unified Threat Management UTM UTM is performed by NetDefendOS through the following features 1 An Anti Virus option to scan file downloads for viruses 2 Intrusion Detection and Prevention to scan all traffic connecting to internal servers 3 Web Content Filtering to implement policies on the types of web sites that can be accessed 1 2 Ethernet Interfaces Chapter 1 Product Overview 1 2 Ethernet Interfaces Physical Interface Arrangement The DFL 160 has a number of physical Ethernet interfaces which can be used to plug into other Ethernet networks The image below shows these interfaces at the back of the hardware unit Interface Network Connections The illustration below shows the typical usage of network connections to the DFL 160 interfaces lt gt Web server SMTP Server Intended Interface Usage The interfaces are intended to be used in the following ways The LAN interfaces There are four physical LAN interfaces which are labeled LAN7 LAN2 LAN3 and LAN4 These
122. us databases The Register at D Link s Portal button opens a web browser window at the page for registering for the IDP or Anti Virus service after purchase from a D Link agent B Update Interval These options allow the frequency of the update interval to be determined The recommendation is to select a time during a day when there is little user activity through the DFL 160 Typically this might be in the early hours of the morning 87 7 1 The Update Center Chapter 7 The Maintenance Menu The default interval is Daily and this is recommended to keep the databases updated with the latest releases It is not often that the databases are updated more than once in a day C History This tab shows the history of recent database updates and can also indicate if there were problems with server access or downloading 88 7 2 Licenses Chapter 7 The Maintenance Menu 7 2 Licenses The license page shows information about the current license installed in the DFL 160 When the DFL 160 is initially delivered it comes with a standard license preinstalled which determines the capabilities of the system Add On Services It is possible to expand the capabilities of the DFL 160 by purchasing a license for any of the following features e Anti Virus This option enables NetDefendOS to scan for viruses in any files downloaded to the unit such as those that might be contained in HTTP or FTP downloads Intrusion Detecti
123. vided with the NetDefend SOHO UTM product The operating system software that drives the hardware is a purpose built networking operating system called D Link NetDefendOS This operating system is also found in D Link DFL firewall products designed for larger enterprises The NetDefendOS Management Interface The principle management interface for the DFL 160 is through a web browser running on a separate computer This computer acts as a management workstation and the DFL 160 acts as a web server allowing the product to be managed through an intuitive set of web pages that are viewed through the web browser The DFL 160 Interfaces The DFL 160 provides 10 100 1000 Mbps capable LAN Local Area Network and DMZ Demilitarized Zone Ethernet interfaces for the internal protected networks plus a 10 100 Mbps capable WAN Wide Area Network interface for connection to the public Internet Further information about all these can be found in Section 1 2 Ethernet Interfaces Additionally a serial interface the COM port is provided for access to a Command Line Interface CLD Below is an image of the back of the DFL 160 unit showing all the connection ports 12V 1 254 USB com 4 3 LAN 2 1 DMZ WAN SEO f E RESET ye oL L L L JE IL Jo s 1 1 The DFL 160 Solution Chapter 1 Product Overview Inside and Outside Networks The NetDefendOS provides the administrator with the ability to control and manage the traffic that fl
124. wall and impose security policies on what kinds of traffic can flow between interfaces and in what direction SYSTEM FIREWALL TOOLS STA As a next step it is recommended to go to the Firewall gt Outbound LAN Traffic menu and decide what kinds of traffic can be initiated by internal hosts and users these options are described in Section 4 1 Outbound LAN Traffic Options By default everything is allowed for outbound connections on the LAN interface but it is recommended to restrict this to the minimum necessary For instance allowing the HTTP and HTTPS services may be sufficient for web surfing A corresponding set of firewall options exists for the DMZ interface see Section 4 2 Outbound DMZ Traffic Options but on initial setup no outbound traffic is allowed on this interface so services must be explicitly allowed The Meaning of Outbound Keep in mind that the term outbound refers to traffic that is initiated from inside behind the DFL 160 in other words from hosts and clients connected to the LAN or DMZ interface All web surfing traffic no matter if it is a server request from a client or the reply to that request is considered to be outbound this point will be repeated later in the manual Conversely inbound traffic is exchanges that are initiated from the outside on the public Internet Using the DMZ for Management By default the DMZ interface is allocated the IP address 792 168 11 1 on the 192 168
125. y for the NetDefendOS routing table Routing table contents max 100 entries Network Interface 192 168 1 150 RemoteUsers_WinXP 10 6 200 3 IPsec_RemoteUsers_WinXP 192 168 1 0 24 lan 192 165 2 0 24 dmz 10 6 0 0 16 wan 0 0 0 0 0 wan In the Flags field of the routing tables the following letters are used O Learned via OSPF X Route is Disabled M Route is Monitored A Published via Proxy ARP D Dynamic from e g IPsec L2TP PPTP servers etc The 0 0 0 0 0 Route When NetDefendOS looks up the routing table it searches for a route which is the closest match possible for the IP address it is trying to find a route to The routing table always contains a catch all route which points to the IP address 0 0 0 0 0 which is a special IP address that means all networks This route is by default assigned to the WAN interface since if NetDefendOS cannot find an IP address on the LAN or DMZ interface then it must be on the public Internet The Route Metric Routing metrics are one of the criteria routing algorithms use to compute the best route to a destination A routing protocol relies on one or several metrics to evaluate links across a network and to determine the optimal path 84 6 11 DHCP Server Status Chapter 6 The Status Menu 6 11 DHCP Server Status As explained in Section 3 3 LAN Settings and Section 3 4 DMZ Settings the LAN and DMZ interfaces can be configured to act as DHCP servers alloc

Download Pdf Manuals

image

Related Search

Related Contents

at least the 10 following steps of the start-up quick  修理見積依頼書 記入要領  Bedienungsanleitung  Samsung GT-I5700 Uživatelská přiručka  Quartet 88342  取扱説明書 小型ロータリ流量計 20mm  Base XML  LibTomMath User Manual v0.33  Aluratek AIRMM01F User's Manual  MODE D`EMPLOI  

Copyright © All rights reserved.
Failed to retrieve file