D-Link DFL-1000 [31/168] Firewall configuration

D-Link DFL-1000 [31/168] Firewall configuration
DFL-1000 User Manual
31
Firewall configuration
By default, the users on your internal network can connect through the DFL-1000 NPG to the Internet.
The firewall blocks all other connections. The firewall is configured with a default policy that matches any
connection request received from the internal network and instructs the firewall to forward the connection
to the Internet.
Default policy
Policies are instructions used by the firewall to decide what to do with a connection request. When the
firewall receives a connection request in the form of a packet, it analyzes the packet to extract its source
address, destination address, and service (port number).
For the packet to be connected through the DFL-1000 NPG, you must have added a policy that matches
the packet's source address, destination address, and service. The policy directs the action that the
firewall should perform on the packet. The action can be to allow the connection, deny the connection,
require authentication before the connection is allowed, or process the packet as an IPSec VPN packet.
You can enable and disable policies. You can add schedules to policies so that the firewall can process
connections differently depending on the time of day or the day of the week, month, or year. You can also
enable web content filtering for policies that control HTTP, SMTP, IMAP, or POP3 services.
Int -> Ext, Int -> DMZ, and DMZ -> Ext policies control connections from more secure to less secure
networks. You can use these policies to apply web content filtering to protect users and servers on your
internal network from downloading undesirable content from the Internet. You can also use these policies
to control IPSec VPN connections through the firewall.
Ext -> Int, DMZ -> Int, and Ext -> DMZ policies control connections from less secure to more secure
networks. You can use these policies to apply web content filtering to protect users and servers on the
Internet from downloading undesirable content from your DMZ network. You can also use these policies
to control IPSec VPN connections through the firewall and to allow remote users to connect to your
internal or DMZ network using PPTP and L2TP VPN.
This chapter describes:
NAT/Route mode and Transparent mode
Adding NAT/Route mode policies
Adding Transparent mode policies
Configuring policy lists
Addresses
Services
Schedules
Virtual IPs
IP pools
IP/MAC binding

Содержание

Скачать