Systems Network Router User Manual

D-Link Product Guide 2008
6
Features & Benefits Features & Benefits
D-Link Product Guide 2008
7


The IPS service for D-Link NetDefend firewall adopts component-based signatures,
which are built to recognize and protect against all varieties of known and unknown
attacks, and which address all critical aspects of an attack or potential attack including
payload, NOP sled, infection, and exploits. In terms of signature coverage, the IPS
database includes attack information and data from a global attack sensor-grid and
exploits collected from public sites such as the National Vulnerability Database and
Bugtrax.
IPS signatures are constantly created and optimized signatures via the Auto-Signature
Sensor System. Without overloading existing security appliances, IPS signatures
ensure a high ratio of detection accuracy and the lowest ratio of false positives.
NetDefend users need to register their firewall to receive IPS update service from
the NetDefend Center. The current status of all registered products will be presented,
including Model Names, MAC addresses, Serial Numbers, Registration dates, and
IPS Service Expiration dates.
The NetDefend Center includes a “NetDefend Live service for users. NetDefend
Live is a platform for providing information about potential security breaches and
associated advisories. When D-Link Security Center discovers new exploits and
releases new signatures, associated security advisories will be simultaneously
updated. This update frequency is provided on an around-the-clock basis. The main
purpose of NetDefend Live is to help users know more about new signatures and
vulnerabilities. MIS departments can use NetDefend Live as reference to uproot
threats and patch vulnerabilities within the enterprise before they are exploited. With
NetDefend firewalls as the first line of defense and NetDefend Live as the second,
D-Link helps customers to counteract emerging network threats promptly, before they
have an impact on business.


» In-depth inspection of data from Layer 2
to Layer 7 protecting against both false
positives and false negatives
» Prevention of various types of network-
based threats with a high degree of
accuracy

» Signatures to manage Instant
Messaging (IM) and Peer-to-Peer (P2P)
applications in the network

» Capture of variations of attacks and
stealthy malicious traffic to prevent
outbreaks of these threats without
creating unnecessary new signatures
while still protecting against Zero-Day
attacks


» All IPS signatures are continuously
updated automatically and made
available through D-Link update servers
worldwide
» Keeps users’ IPS signature database as
current as possible at the outside of new
threats


» Protects system against network attacks
using over 1,800 signatures as well as
protocol anomaly inspection


» Complete IPS logs with vulnerability
ID numbers, severity levels, attack
descriptions, and recovery solutions
» Enable MIS personnel to know about
and respond quickly to network attacks
 1 Year IPS Subscription for DFL-210 Firewall
 1 Year IPS Subscription for DFL-800 Firewall
 1 Year IPS Subscription for DFL-1600 Firewall
 1 Year IPS Subscription for DFL-2500 Firewall
 1 Year IPS Subscription for DFL-260 UTM Firewall
 1 Year IPS Subscription for DFL-860 UTM Firewall


» D-Link firewall AV defenses rely on
Kaspersky Labs, the market leader in
AV signature creation to provide the
fastest response to the most dangerous
viruses, Trojans, worms, and spyware
programs.

» Built-in extreme-performance AV
acceleration engine that allows D-Link’s
UTM firewalls to perform with a much
higher throughput than other anti-virus-
capable UTM firewalls on the market.


» Streaming-based scan engine
inspection of all payloads and matches
the signature packet-by-packet.
File-based AV protection will never
encounter file-size limitation since D-
Link firewalls do not need to store whole
files in memory for inspection purposes.

» All anti-virus signatures are updated
hourly and made available through
D-Link update servers worldwide, and
emergency signature releases protect
against the latest, most virulent virus
variations.


» Proactive signature database protection
for each system against network worms,
Trojans, and spyware with over 2,000
signatures covering all Wild List threats
and thousands of well-known OS
exploits and application vulnerabilities.


» Complete anti-virus logs with issue
dates, behavior and technical details
enable MIS personnel to know about
and then respond immediately to virus
threats and infections.
D-Link NetDefend UTM firewalls implement stream-based virus scanning technology
without first caching incoming files, thus increasing inspection performance and easing
network bottleneck nightmares while enabling powerful virus defense capabilities.
D-Link’s firewalls use virus signatures from the known, respected antivirus company
Kaspersky Labs to provide users with prompt signature updates and reliable, accurate
antivirus signatures. Using a built-in extreme-performance AV acceleration engine
together with stream-based virus scanning technology, NetDefend UTM firewalls block
viruses and malware before they ever reach the network’s desktops or mobile devices.
NetDefend firewalls create a safer network environment for companies of all sizes, from
SMB to enterprises.
 1 Year AV Subscription for DFL-260 UTM Firewall
 1 Year AV Subscription for DFL-860 UTM Firewall
ZoneDefense Technology
Anti-Virus
Intrusion Prevention System
Web Content Filtering
High Performance
D-Link UTM Firewall
Hardware Acceleration Technology
User Authentication
Traffic Shaping
Availability
VPN
High Port Density
Load Balancing