D-Link DFL-600 Firewall/VPN Manual Rev. 4.
Table of Contents Introduction......................................................... 4 IP Address Settings and Computer Settings ...... 8 Introduction and Overview.................................. 9 Using the Configuration Utility ............................ 12 Setup Wizard ...................................................... 14 Home .................................................................. 20 WAN Settings ..................................................... 21 LAN Settings.................
Package Contents Contents of Package: • • • • • D-Link DFL-600 Firewall/VPN Router Manual Quick Installation Guide Power Adapter, 5V DC, 2.5A* CAT-5 UTP Cable If any of the above items are missing, please contact your reseller. *Using a power supply with a different voltage rating will damage the product and void the warranty. System Requirements: Internet Explorer 5.5 or higher or Netscape Navigator 7.1 or higher, with JavaScript enabled.
Introduction The D-Link DFL-600 VPN Router enables your network to connect to the Internet via a secure, private connection using a Cable or DSL modem. The Virtual Private Network (VPN) that is created on the Internet between your home and a VPN server in your office is secure from interference when you use the DFL-600. It is an ideal way to connect your computer to a Local Area Network (LAN).
Front View LED Indicators WAN Link/Act. (Green) WAN 10/100 (Green) DMZ Link/Act. (Green) DMZ 10/100 (Green) LAN (1-3) Link/Act. (Green) LAN (1-3) 10/100 (Green) Power (Green) Green LED will LIGHT when a good link is established. Green LED will BLINK when packet is transmitting or receiving (Act.). Green LED will LIGHT when a 100 Mbps Link is established. Green LED will NOT LIGHT when a 10 Mbps Link is established. Green LED will LIGHT when a good link is established.
Rearview Power (5V 2.5A DC) WAN Ports 1-3 DMZ Reset Connects the DC power adapter to the Power port Connects DSL/Cable modem to the WAN Ethernet port Connect networked devices such as computers and ftp servers to the three LAN ports. All LAN ports support auto crossover. Connects a networked device to the DMZ zone of the Firewall/VPN Router. The DMZ feature can be disabled. To reload the factory default settings, press the reset button.
Firewall Protection Supports general hacker attack pattern monitoring and logging. PPPoE Client Supports PPPoE client function to connect to a remote PPPoE server. Virtual Server Allows the internal server to be accessible from the Internet Upgradeable New Features Allows new features to be added in the future High Performance 64 bit RISC CPU Engine With the most advanced 64 bit RISC CPU Engine, DFL-600 guarantees full compatibility with future DSL/Cable technologies.
IP Address Settings and Computer Settings In order to install the DFL-600 you will need to check your computer’s settings and the values from your ISP.
Introduction and Overview The DFL-600 Firewall/VPN Router creates two separate networks on the LAN side of your network − by default, a 192.168.0.0 subnet and a 192.168.1.0 subnet (both with a subnet mask of 255.255.255.0). The DFL600 routes packets between these two subnets and the Internet (or the network connected to the DFL-600’s WAN port). An Internet Service Provider (ISP) or a network administrator provides the network address information on the WAN network. The 192.168.0.0 network − LAN.
The DMZ port is used to allow computers and devices connected to this port to have more direct access to the Internet. This is useful for certain applications that may conflict with the firewall and Network Address Translation (NAT) features of the DFL-600. Computers and devices connected to the DMZ port will not have the level of protection that the LAN ports can provide, however.
address, subnet mask, default gateway address, and primary and (optional) secondary DNS addresses. This information will be provided by your ISP. Point-to-Point Protocol over Ethernet (PPPoE) − this protocol requires the use of a Username and Password to gain access to the network. In addition, you can specify a Connect on Demand connection that will connect to the Internet only when a computer or device on your LAN makes a request, or when the DFL-600 is rebooted.
Using the Configuration Utility Launch your web browser and type the device IP address (https:// 192.168.0.1) in the browser’s address box. This is the default IP address of your DFL-600. Press Enter. The following dialog-box will appear to prompt you to enter the DFL-600’s default User Name and Password. The DFL-600’s default User Name is admin and the default Password is also admin − all lower case. Click OK to open the Home menu.
The Setup Wizard will guide you the most basic setup tasks, such as setting an administrative password, selecting the type of WAN connection you have, entering your computer’s host name (if required by your ISP), saving the configuration and restarting the router. All other setup tasks can be accomplished using the configuration utility from your web browser. To use the Setup Wizard, click on the Run Setup Wizard link. This will start the Setup Wizard.
Setup Wizard The Setup Wizard will guide you through the most basic setup tasks for the DFL-600. All other configuration tasks can be accomplished through the web-based manager. The Home menu contains a Run Setup Wizard link. Click on this button to run the Setup Wizard. Click Next to continue.
Enter a password in the Password field, and again in the Verify Password field. This will become the logon password for the DFL-600. This password is case-sensitive, so remember to use capital letters when logging on to the DFL-600’s web-based manager − if you enter a password with capital letters here. The user name, admin, will not be changed here. Note: If you choose to input a password, please remember it.
This menu allows you to select the type of connection your ISP provides. Many ISPs use the PPPoE (Point-to-Point Protocol over Ethernet) for DSL connections, while many Cable ISPs use DHCP (Dynamic Host Configuration Protocol). DHCP assigns an IP address for your Internet connection each time you log on (and is therefore, a dynamic IP address). DHCP is referred to as Dynamic IP address on the DFL-600.
Some ISPs require you to use an assigned host name for your Internet connection. If your ISP requires this, you can enter the assigned host name in the Host Name field. If you selected Static IP Address on the Select Internet Connection Type (WAN) wizard screen above, the following screen will open: This screen will allow you to enter the static IP address information, if your ISP has assigned a static IP address to your Internet account. Your ISP must provide this information.
This screen will allow you to enter the PPPoE information, if your ISP uses the PPPoE protocol for your Internet account. Your ISP must provide this information. Click Next to continue.
You have completed the basic setup Wizard. The configuration now needs to be entered into the DFL-600’s non-volatile RAM. Clicking Restart will save the configuration to non-volatile RAM and restart the router.
Home The Home menu contains links to all of the setup menus for the DFL-600.
WAN Settings The WAN Settings menu allows you to view the current configuration for your DFL-600, and to choose the protocol by which your DFL-600 will receive its WAN network settings. The settings listed under WAN Settings are the network settings currently in use by the DFL-600. The fields where you will enter the WAN Settings will change depending upon the choice you make in the IP Settings Mode dropdown menu. These settings are described below.
IP Settings Mode This drop-down menu determines how the DFL600 will obtain its IP address information. The fields where you will enter the information will change, as appropriate, to reflect the mode you have selected. The page shown above is in Dynamic mode. Dynamic allows the DFL-600 to get its IP address information from your ISP using the Dynamic Host Configuration Protocol (DHCP). Use this setting if your ISP instructs you to use DHCP or to automatically obtain an IP address.
Default Gateway Primary DNS Server Secondary DNS Server This is the IP address of a device at your ISP’s office where packets destined for the Internet − from your home network − are sent, before being forwarded to their final destination. For the DFL-600, the Default Gateway address is provided by your ISP. For computers on your home network, their Default Gateway is the IP address of your DFL-600.
MAC address when connecting to the cable modem. Clicking on the Clone button will enable this function. Remember to click the Apply button and then to save the changes using Tools, System, and the Save button.
Static IP Address − If your ISP has assigned you an IP address that will never change, choose this option.
PPPoE − If your ISP uses Point-to-Point Protocol over Ethernet (PPPoE), choose this option. When this option is chosen, the following fields appear to allow you to enter the network address information: Connect on Demand − allows the PPPoE WAN connection to be active only when a computer on your LAN makes a connection request. This is similar to the way a dial-up modem initiates a connection.
LAN Settings The LAN Settings allows you to view the current IP address and subnet mask assigned to the DFL-600. It also allows you to change these settings. If it is necessary to change the IP Address or Subnet Mask assigned to the DFL-600, enter the new values in the appropriate fields, and press Apply to make the changes current.
As an example, if your LAN network is to be a 192.168.0.x network with a subnet mask of 255.255.255.0, you might assign the DFL-600 an IP address of 192.168.0.1 and configure the DFL-600’s DHCP server to assign addresses in the range between 192.168.0.2 to 192.168.0.100. The default gateway setting for computers on the LAN side will be the DFL-600’s IP address − in this case, 192.168.0.1.
DHCP Settings DHCP (Dynamic Host Configuration Protocol) is a method of automatically assigning IP addresses, subnet masks, default gateway and DNS server IP address to computers on the LAN side of the DFL-600. The DFL-600 can be a DHCP server for your LAN, assigning IP addresses, etc. to computers on your network from a range of addresses you specify below. DHCP Server Status Starting IP Address This allows you to Enable or Disable the DHCP Server feature on the DFL-600. The default is Enabled.
the IP address assigned to the DFL-600 be contained in the range of IP addresses available for the DFL-600 to assign. In this case, the IP address of the DFL-600 is 192.168.0.1, so the first IP address in the range is 192.168.0.2. Ending IP Address Lease Time Auto Configuration IP addresses can range from 0.0.0.0 to 255.255.255.255, but in the DFL-600’s default IP addressing scheme, the range is from 192.168.0.0 to 192.168.0.255.
Domain Name Primary DNS Server Secondary DNS Server The DFL-600 can provide a domain name to computers on your network. This domain name suffix can be provided automatically by your ISP, or you can enter it statically here. This suffix will then be automatically added to URL requests for access to your ISP’s servers. This is the IP address of a server on the Internet that provides the service of changing text URLs into IP address for sites on the Internet.
MAC Address IP Address DHCP Client This is the MAC address of the PC you want to assign the IP address specified below using DHCP. This is the IP address you want to assign the PC identified by its MAC address above, using DHCP. This identifies the PC as either a DHCP client or not. This allows you to check to see if the specified MAC address has already been assigned an IP address using DHCP.
NAT Network Address Translation Note: NAT is automatically applied between the WAN and the LAN sides of the DFL-600. It does not require any user configuration. Network Address Translation (NAT) is a routing protocol that allows your network to become a private network that is isolated from, yet connected to the Internet.
DMZ NAT and the firewall features of your DFL-600 may conflict with certain interactive applications such as video conferencing or playing Internet video games. For these applications, a bypass can be set up using the DMZ port and a corresponding DMZ IP address. The DMZ IP address is “visible” to the Internet (or WAN) and does not benefit from the full protection of the NAT function.
DMZ Settings The DMZ Settings screen allows you to Enable and Disable the DMZ port on the DFL-600 and to specify the IP address and Subnet Mask that the DMZ port will use. The default DMZ IP address is 192.168.1.1 with a subnet mask of 255.255.255.0. IP Address Subnet Mask This is the IP address assigned to the DMZ port, and will be assigned to a PC that you connect to this port. You can assign any IP address to the DFL-600’s DMZ port that is within the range 192.168.1.1 to 192.168.1.254.
to connections to the WAN or Internet. The IP address must be from the same range as the IP address of the DMZ port. The default DMZ IP address is 192.168.1.1, so DMZ Servers must be from the IP address range from 192.168.1.2 to 192.168.1.254, with a subnet mask of 255.255.255.0. DMZ host IP address This is the IP address you have assigned to your DMZ computer. You will need to manually configure the IP address settings for each computer you connect to the DFL-600's DMZ port.
Time Settings The DFL-600 can be set to obtain and distribute the correct time to computers on your LAN using the Simple Network Time Protocol (SNTP). Click on the Time button to open the following page: System Date Time Time Zone Time Set Type Displays the current system date and time. This drop-down menu allows you to select the time zone in which your DFL-600 is located. This drop-down menu allows you to specify the method the DFL-600 will use to obtain the date and time.
Set Type IP address Domain Name YYYY-MM-DD HH:MM:SS This drop-down menu allows you to select either the IP address of an SNTP server, or the Domain Name (URL) of an SNTP server that the DFL600 will contact to obtain the correct date and time. Enter the IP address of an SNTP server here. Enter the Domain Name (URL) of an SNTP server here. These fields allow you to manually enter the date using a year-month-day format. These fields allow you to manually enter the time using an hour: minute: second format.
Clicking the Enable click box, opposite the User Control table entry, will open the rest of the User Management page, including the Bandwidth control and Management Type table entries.
User Control Logout Timer Bandwidth Management Type This allows you to enable or disable the authentication of users on the LAN side of the DFL-600, without changing the configuration settings. This is useful when you need to troubleshoot Internet access problems for PCs on your LAN. You can enter a maximum amount of time that users are allowed to be “logged in”. When a user is logged in for a period of time longer than that specified here, they must log in again.
Clicking the Add Users link will open the following page: Add Users User name Password This allows you to add User names and Passwords for users on your LAN. In the Local mode, the DFL-600 authenticates users based upon the User name and Password entered here. Enter a User name here. Enter a Password corresponding to the User name entered above. POP3 The Post Office Protocol, version 3 (POP3) is used to access and retrieve email from a mailbox on a server that is usually located at your ISP’s facility.
POP3 Server IP Server Port The Post Office Protocol, version 3. This is used to view and retrieve e-mail from a POP3 server on the WAN. Enter the IP address of your POP3 server here. Your ISP should provide you with this address. This is the TCP port number that the POP3 server will use to communicate with PCs on your LAN. TCP port 110 is the ‘well known’ or default port used for the POP3 protocol.
If you have some PCs (or other network devices) that do not require RADIUS user authentication to access the WAN (Internet), you can enable 802.1x, and then enter the IP Address and IP (subnet) Mask of these devices under the Edit link (which will appear when you enable 802.1x). PCs and network devices that have their IP Address and IP (subnet) Mask entered on the 802.
RADIUS 802.1X Server IP Authentication Port Accounting Port The Remote Access Dial-in User Service (RADIUS) is one of the most common protocols used to carry authorization, authentication, and configuration information between a RADIUS server on the WAN and PCs on your LAN. Choosing RADIUS will allow the DFL-600 to connect PCs on your LAN to a RADIUS server on the WAN. 802.1x is a standard for passing the Extensible Authentication Protocol (EAP) packets over a LAN.
Secret Key Accounting Service Authentication Method RADIUS server will use to connect to PCs on your LAN for the RADIUS accounting function. The default port number for accounting is 1813. Enter the shared key used between PCs on your LAN and the RADIUS server. Use the drop-down menu to enable or disable the RADIUS accounting service. Use the drop-down menu to enable or disable the RADIUS accounting service. Clicking the 802.1x Enable click-box, and then Edit link will open the following page: 802.
Clicking on the Edit link (which appears when you enable 802.1x) will open the 802.1x Device Configuration page, as shown below. If you have PCs on your LAN that do not require RADIUS user authentication to access the Internet (or other networks through your ISP), you can use Enable 802.1x, and then click the Edit link. This will allow you to enter the IP Address and IP (subnet) Mask of PCs on your LAN that need to bypass the RADIUS user authentication.
802.1X 802.1x is a standard for passing the Extensible Authentication Protocol (EAP) over a LAN. You should enable this only if there are 802.1x devices between the DFL-600 and the RADIUS server on the WAN. Clicking on the Edit link (which appears when you enable 802.1x) will open the 802.1x Device Configuration page, as shown below. Use this table to enter the IP Address and IP Mask The DFL-600 supports only 802.1X pass through. This means that the DFL-600 will forward 802.
Clicking the LDAP click box will open the following page: LDAP Server IP Server Port Base DN Enter the IP address of your LDAP server here. Your ISP should provide you with this address. This is the TCP port number that the LDAP server will use to communicate with PCs on your LAN. Port 389 is the ‘well known’ or default port used for LDAP, while Secure LDAP uses port 636. This is the Distinguished Name used for LDAP.
Advanced Settings NAT Network Address Translation Network Address Translation (NAT) is a routing protocol that allows your network to become a private network that is isolated from, yet connected to the Internet. It does this by changing the IP address of packets from a global IP address − assigned by your ISP − usable on the Internet to a local IP address − assigned by you − usable on your private network (but not on the Internet.
Private IP Transport Type This is the IP address of the server on your LAN that will provide the service to remote users. You can select the transport protocol (TCP or UDP) that the application on the virtual server will use for its connections. The choice of this protocol is dependent on the application that is providing the service. If you do not know which protocol to choose, check your application’s documentation.
Application Gateway (ALG) Some applications (programs running on a PC on your LAN) require multiple TCP or UDP ports to function properly. Applications such as Internet gaming, video conferencing, and Internet telephony are some examples of applications that often require multiple connections. These applications often conflict with NAT, and therefore require special handling.
Trigger Type Max Activity Interval Session Chained Address Replacement Replacement Format Allow sessions initiated from/to 3rd host Popular Applications single port, or a range of ports. If only a single port is used, enter the same port number in both the starting and ending port number fields. This is the protocol (TCP or UDP) that the application uses to make the connection. This is the maximum interval, in milliseconds, between the triggering of a protocol session and the protocol’s dynamic session.
firmware and can be selected here from the dropdown menu. Selecting one of the listed applications is the equivalent of entering the correct settings in the fields above for the specific application. For example, the Netmeeting application requires a Trigger Port Range of 1720 – 1720, a Trigger Type of TCP, and so on. The correct settings for the applications listed in this drop-down menu have been entered into the DFL-600’s firmware, for your convenience.
Destination IP Network Subnet Mask Gateway IP Address This is the IP address of the remote network that the DFL-600 will route service requests to. This is the corresponding subnet mask for the remote network. This is the IP address of the gateway on the remote network that will provide the connection between your DFL-600 and servers on the remote network. Dynamic Routing Your DFL-600 can automatically discover routes to destinations on both your LAN and the WAN (Internet).
Rip Version RIP Enabled Interface Your DFL-600 can automatically discover routes to destinations on both your LAN and the WAN (Internet). You can choose either RIP1, RIP2 or None. RIP2 (Routing Information Protocol version 2) adds support for variable-length subnet masks, and is generally the best choice. Choosing None will disable the routing function of your router, as will choosing Disabled for the WAN or LAN RIP interface.
Network Address Subnet Mask Interface Name Multicast Support Update Timer Timeout Timer Garbage Collection Timer LAN RIP interface will disable the routing function of your router. This is the IP address of either the LAN or WAN side of your DFL-600. This is the subnet mask corresponding to the Network Address above. This is the name of the interface corresponding to the Network Address above. You can enable or disable multicast support. It is recommended that you enable this feature.
In the case shown above, the DFL-600’s WAN port was connected to a 10.0.0.0 network − with a subnet mask of 255.0.0.0. The LAN ports used the default 192.168.0.0 network addresses, and the DMZ port used the default 192.168.1.0 network addresses − both with a subnet mask of 255.255.255.0. The 0.0.0.0 IP address signifies the Broadcast address − the address within the DFL-600 where all packets that have an unknown destination address are forwarded. The DFL-600 then relates the 0.0.0.
Policy (Firewall) Configuration Some Examples Your DFL-600 allows you to make policy rules and then group these rules into a policy that will limit the types of access PCs on your LAN can have to the WAN (Internet). In addition, you can create a Schedule that will determine at what times and days of the week these policies are enforced.
A schedule called NoWeekDays has been entered with the hours between 6 pm and 9 pm checked for the weekdays Monday through Friday. Click on the Apply button to enter this schedule into the Schedule Table. You can enter up to 15 Schedules, but two default schedules are automatically maintained by the DFL-600 − Always and None. You can make changes to the None Schedule, but the Always Schedule is intended for policies that should always be enforced.
You can change the times and days entered for a Schedule by clicking on the link below the Schedule View heading. This will open the Schedule Rules page for the corresponding Schedule Name, and allow you to make changes. Setting the Policy Rules Now you need to configure the DFL-600 to block PCs on your LAN from accessing Web-pages on the WAN (Internet). To do this, click on the Policy button to open the Policy Rules page, as shown below. Enter a name for this rule in the Rule Name field.
range to PCs that you want the Policy Rule to apply to, and leave PCs with IP addresses outside the range free to access web-pages on the WAN (Internet). For simplicity in this example, we are going to specify Any in both the Source IP Range and Destination IP Range fields. This will mean that any PC on your LAN will be denied access to web-pages on the WAN (Internet) regardless of that PC’s IP address.
Now that the Policy Rule − Block Web − is configured, we want to add this Policy Rule to a Policy group. Click on the Policies link to open the Policy Add page, as shown below.
Enter a name for the Policy group in the Policy Name field. This name will be used to reference this Policy group. In this case, we have named this Policy group StudyTime. The schedule we created previously will appear in the Assign to Schedule drop-down menu and is selected as the times and days of the weed this Policy will be enforced. We want to deny access to PCs on our LAN, so in the Action drop-down menu, we select Deny.
Under the Rule Filter heading, click Enabled, and then click the “Outbound Firewall Rule” link. This will open a page that contains all of the Policy Rules that apply to Outbound packets, as shown below.
Click the box under the Add heading to add the BlockWeb Policy Rule to the StudyTime Policy group. Click the Apply button to make the entry current. Click the Back button to return to the Policy Add page. Setting the Policy Global Status Now we need to configure the Global Policy Status. Click the Global Policy Status link − from the Policy Add page − to open the following page.
For the BlockWeb Policy Rule and the StudyTime Policy group, we need to set the Outbound Port Filter to Enabled − by clicking the Enabled clickbox − and to select the Allow all except policy settings option. When Allow all except policy settings is selected, the DFL-600 will drop (filter) packets that meet the criteria established in the Policy Rules (in this case, HTTP packets). All other packets will be forwarded to their destination.
Remember to save the Policy configuration into the DFL-600’s non-volatile RAM using the Save button (under the Tools tab, click the System button to see the Save options). This will ensure that the DFL-600 will retain the Policy configurations when it is restarted or if the AC power is interupted. Example 2 − Limiting Access to Internet Domains Policy Rules The DFL-600 allows you to specify rules that it will use to limit access (filter packets) to and from PCs on your LAN.
Enter a name for the policy rule you want to configure in the Rule Name field. This name will appear in the Service Rules table, along with all of the parameters you specify for the rule, and is used to identify and reference the rule on subsequent web pages, as described below. In the case shown above, a rule called notelnet has been entered to block telnet packets from coming in from the WAN to the LAN.
The next step is to specify if you want the policy rule to apply to Inbound or Outbound packets. Inbound here means from the WAN to your LAN, while Outbound means from your LAN to the WAN. The Direction drop-down menu allows you to choose which direction the DFL-600 will filter packets that meet the criteria of the policy rule.
Policy Status page, “Default allow all” means that the DFL-600 will allow all packets except those that meet the criteria established in the policy rules. “Default deny all” means that the DFL-600 will deny (filter) all packets except those that meet the criteria established in the policy rules. Policies − Policy Add Once you have defined what type of packets you want the DFL-600 to look for, you need to assign those rules to a policy.
Enter a name for the new group of policy rules in the Policy Name field. This name is used to reference the group of policy rules. You can also assign this group of policy rules to a schedule (which is either Always or a schedule you can create below). Finally, you can choose to Allow or Deny access. Blocking Internet Domains The DFL-600 will allow you to make a list of Domain names for which packets will be filtered. Clicking on the Domain Add link on the Policy Rules page will open the following page.
Enter a domain name you want to limit access to in the Domain Name field. Click the Apply button to add this domain name to the list. Blocking Keywords The DFL-600 will allow you to make a list of keywords for which packets will be filtered Clicking on the Keywords Add link on the Policy Rules page will open the following page. Enter a key word you want the DFL-600 to examine packets for in the Key Word field. Click the Apply button to enter this key word into the list.
Blocking MAC Addresses The DFL-600 will allow you to make a list of MAC addresses for which packets will be filtered. MAC (Media Access Control) addresses are the physical addresses that are assigned to networking devices by their respective manufacturers. These addresses are 12 hexadecimal digits long and are in the form 01-23-45-67-89-AB − where the numerals 0-9 and the letters A-F are used. Clicking on the MAC Add link on the Policy Rules page will open the following page.
IPSec Settings IPSec (IP Secure) is a group of IP extensions developed by the Internet Engineering Task Force (IETF) to provide security services that are compatible with the existing IP standard. IPSec provides authentication, integrity, access control, and confidentially. The data and information exchanged between two ends of an IPSec connection can be encrypted and verified. Virtual Private Network (VPN) Tunnels can be created to allow encrypted and secured communication across networks or the Internet.
IPSec Pass-through IPSec Status Click Enable to allow IPSec packets to pass through the router to the destination computer on your LAN. When IPSec Pass-through is enabled, the DFL-600 will allow IPSec packets to reach their destination computer on your LAN. Click Enable to make the IPSec settings active. Manual Key Settings There are two methods for exchanging the encryption/decryption keys required by IPSec − Manual Key entry and Internet Key Exchange (IKE).
SPIs to maintain the IPSec connection. An IKE VPN is generally considered more secure than a Manual Key VPN because IKE can generate new keys and SPIs randomly during the negotiation phase. To configure a Manual Key VPN, click the Manual Key link to open the page shown below.
Add/New Tunnel Tunnel ID Termination IP Shared Key Local SPI Remote SPI IPSec Operation The following fields will identify the Manual Key VPN tunnel on the DFL-600. An alphanumeric string that identifies the remote tunnel. A sting of up to 63 characters can be entered. The Tunnel ID is sometimes called the Negotiation ID of the remote gateway. The IP address of the remote gateway. The encryption key that should be entered exactly the same way on both endpoints in order to establish Phase 1 negotiation.
ESP Transform This drop-down menu allows you to select the encryption algorithm that will be used when ESP is selected in the IPSec Operation dropdown menu above. You can choose between Null − no encryption, DES − using DES encryption, and 3DES − using triple DES encryption. Encryption Key (ASCII) ESP Auth You must select the exact same ESP transform (encryption algorithm) on both ends of a VPN tunnel. Enter the predetermined alphanumeric Encryption key.
AH Transform Authentication key on both ends of a VPN tunnel. This drop-down menu allows you to select the authentication method that will be used when AH is selected in the IPSec Operation dropdown menu above. You can choose between MD5 − using MD5 message digest authentication, and SHA − using the SHA authentication method. You must select the exact same AH authentication method on both ends of a VPN tunnel. AH Auth Key (ASCII) Enter the predetermined alphanumeric AH Authorization key.
Subnet Mask Enter the subnet mask corresponding to the IP address range entered above. Tunnel Settings − IPSec There are two methods for exchanging the encryption/decryption keys required by IPSec − Manual Key entry and Internet Key Exchange (IKE). The difference between Manual Key and IKE is how the encryption keys and SPI are determined. The Tunnel Settings page on the DFL-600 allows you to configure IKE for an IPSec VPN tunnel.
Add/New Tunnel Tunnel Name Peer Tunnel Type The following fields will identify the VPN tunnel on the DFL-600. Enter a name by which this IPSec VPN tunnel configuration can be referrenced.
this VPN tunnel will connect with using this drop-down menu. Static IP address allows you to specify the IP address of the remote end of the VPN tunnel − assuming that this IP address does not change (is statically assigned by the remote peer’s ISP). Domain Name allows you to specify the domain name of the remote end of the VPN tunnel. This requires that the designated DNS server for the DFL-600 be able to resolve the specified domain name into an IP address.
Sting(FQDN) − This allows you to specify that the “fully-qualified domain name” of the remote end of the IPSec VPN tunnel will be used to identify and authenticate the remote host. Peer ID Shared Key Phase 1 Proposal Phase 2 Proposal Target Host Range Starting Target Host Email(UFQDN) − This allows you to specify that the E-mail address of the remote end of the IPSec VPN tunnel will be used to identify and authenticate the remote host.
IP addresses of computers on the remote LAN that will be allowed to access the VPN. In this case, the entire subnet of IP addresses from 192.168.2.1 to 192.168.2.254 will be allowed to access the VPN. Subnet Mask Note that the IP addresses192.168.2.0 and 192.168.2.255 are reserved for use on the remote network. Enter the subnet mask corresponding to the IP address range entered above.
Mode DH Group IKE Life Duration IKE Hash IKE Encryption You can select between Main and Aggressive modes for the Phase 1 negotiation to establish a VPN IPSec tunnel. In the Main mode, all communication between the two endpoints of an IPSec VPN tunnel are encrypted. In Aggressive mode, there is no encryption in the Phase 1 negotiation. The DH algorithm allows the DFL-600 to generate secret keys for encryption for the Phase 1 negotiation.
encryption algorithm that will be used to encrypt the messages passed between the VPN tunnel endpoints during the Phase 1 negotiation. You can choose between DES and 3DES encryption methods. The key length for the 3DES algorithm is three times as long as the DES key, and is therefore more likely to be secure. You must choose exactly the same IKE Encryption algorithm on both ends of a VPN tunnel.
IPSec Operation IPSec Life Duration mode that will be used for IPSec Perfect Forward Security (PFS). The choices are Disabled, Group 1, and Group 2. Group 1 uses 768-bit encryption, and Group 2 uses 1024-bit encryption. You must use exactly the same PFS encryption mode on both ends of the VPN tunnel. This drop-down menu allows you to select the level of encryption that will be applied to packets that are sent between the two endpoints of a VPN tunnel.
ESP Transform This drop-down menu allows you to select the encryption algorithm that will be used when ESP is selected in the IPSec Operation dropdown menu above. You can choose between Null − no encryption, DES − using DES encryption, and 3DES − using triple DES encryption. ESP Auth You must select the exact same ESP transform (encryption algorithm) on both ends of a VPN tunnel.
VPN-PPTP Settings The Point-to-Point Tunneling Protocol (PPTP) is another method of establishing a secure tunnel between the DFL-600 and a remote gateway. The PPTP Settings page allows you to enable or disable PPTP on the DFL600. PPTP Pass Through PPTP Status Starting IP Address Ending IP Address Click Enable to allow PPTP packets to pass through the router to the destination computer on your LAN.
PPTP Account The PPTP Account settings page allows you to enter a username and password for a PPTP account. A combined maximum of 64 PPTP and L2TP user accounts can be configured on the DFL-600. Username Password Confirm Password Enter the appropriate username for your PPTP account here. Enter the appropriate password for your PPTP account here. Retype the password you entered above here to confirm that it has been entered correctly.
VPN-L2TP Settings The Layer 2 Tunneling Protocol (L2TP) is another method of establishing a secure tunnel between your DFL-600 and a remote gateway. The L2TP Status page allows you to enable or disable L2TP on the DFL-600. L2TP Pass Through L2TP Status Starting IP Address Ending IP Address Click Enable to allow L2TP packets to pass through the router to the destination computer on your LAN.
L2TP Account The L2TP page allows you enter your username and password for an L2TP account. A combined maximum of 64 PPTP and L2TP user accounts can be configured on the DFL-600. Username Password Confirm Password Enter your L2TP account username here. Enter your L2TP account password here. Re-enter your L2TP account password here to verify it has been entered correctly. L2TP Status Click on the L2TP Status link to display the current status of an L2TP tunnel on the DFL-600, as shown below.
DDNS The DFL-600 can be configured to use Dynamic DNS (DDNS). If you choose to use DDNS you must fist setup a user account with either Dynamic DNS Network Services (www.dyndns.org) or PeanutHull(China) − a service available in China. Please visit their respective websites for more information. Clicking on the DDNS button from the Advanced page will open the following page. DDNS Provider Host Name Username/E-mail Password/Key This allows you to enable or disable DDNS on the DFL-600 Select either Dyndns.
Tools − Administration The Admin Settings page allows you to add or edit the Username and Password list to control access to the configuration of the DFL-600. A default user account is configured with the username admin, and a password of admin. You can change the password at any time. Username Old Password New Password Confirm Password Enter the username for the account here. Enter the old password here. Enter the new password for the account here.
Remote Access The Remote Access page allows you to enter the IP addresses of computers on the WAN (Internet) that will be allowed to access the configuration utility. If you do not enter any IP addresses on this page, then no IP address on the WAN side of the DFL-600 (no computer from the Internet) will be allowed to access the DFL-600’s configuration utility. Proxy Redirect The DFL-600 allows you to specify a proxy server for your LAN. Enter the IP address and the port number in the fields provided.
PPPoE Passthrough The DFL-600 allows you to pass PPPoE authentication and connection packets to a PC on your LAN that will then make the connection using appropriate software to give the server at your ISP the appropriate username and password, if necessary. Tools − System The System Settings page allows you to save the current configuration to the DFL-600’s Flash RAM (NVRAM).
Tools − Firmware The Firmware Upgrade page allows you to upgrade the DFL-600’s firmware from a new firmware file stored on your local hard drive. In addition, you can choose to load the DFL-600’s current VPN or Firewall settings to a hard drive on a local computer. Clicking on the OK button will initiate a download of either the VPN settings (as a text file named DFL600_vpn.txt) or the Firewall settings (as a text file named DFL600_cw.txt).
Update File Browse Enter the full DOS path and filename to the new firmware file on your local hard drive. For example, if the file is in the root directory of your C drive, enter C:\newfile.had and click the OK button to begin the file transfer. If you are unsure about the location of the new firmware file on your local hard drive, click the Browse button to open a Windows Explorer window to look for this file.
Status − Device Info The Device Information page displays the current network settings and allows you to view the IP address assigned to the DFL-600 by your ISP using DHCP (Dynamic Host Configuration Protocol − the Dynamic IP Address setting on the WAN Settings page under the Home page). LAN Status MAC Address IP Address This is the MAC address of the DFL-600 on the LAN. This is the DFL-600’s current IP address on the LAN.
Subnet Mask DHCP Server WAN Status MAC Address Connection Type IP Address Subnet Mask Default Gateway Primary DNS Secondary DNS This is the subnet mask corresponding to the IP address above − that is currently in use by the DFL-600 on the LAN. Displays whether the DFL-600 is currently configured as a DHCP server on the LAN. This is the MAC address of the DFL-600 on the WAN. This displays the current connection type between the DFL-600 and your ISP. This is the IP address of the DFL-600 on the WAN.
Private IP: Port Pseudo IP: Port Peer IP address: Port Transport This is the IP address and port number of a computer or device on your LAN that has an active NAT session. This is the IP address and port number that the DFL-600 used to establish the LAN side of the NAT connection This is the IP address and port number of a computer or device on the WAN that has an active connection with the DFL-600 This is the transport protocol in use by the corresponding session.
on your LAN, or between computers on your LAN and the WAN) because they meet the criteria pre-defined at the factory as being a commonly used intrusion method, are recorded here, in the Intrusion Detection Log, as shown below: Intrusion Type Source: port Destination: port A brief statement of the type of intrusion that was attempted is displayed here. Displays the source IP address and the TCP/UDP port that the intrusion was attempted from.
Transport Type Source Destination: port Blocking Reason The protocol used to make the connection attempt is displayed here. The IP address and the TCP/UDP port number of the computer or device that was the destination of connection attempt to the DFL is displayed here.
Source: port Destination: port Type Terminate Reason The IP address and TCP/UDP port number of the computer or device that initiated the session is displayed here. The IP address and TCP/UDP port number of the computer or device that responded to the session initiation is displayed here. The protocol used to conduct the session is displayed here. When the session is terminated, it is displayed here.
intruder’s IP address will remain in the Intruder Blacklist for an additional amount of time. While the intruder’s IP address is on the DFL-600’s Intruder Blacklist, that IP address is blocked from sending packets through the DFL600. Source IP Destination IP Destination Port/Transport Type Blocking Time The IP address of a computer or device that will not be allowed to make a connection from the WAN to the DFL-600 is displayed here.
IPSec Log The DFL-600 maintains a table containing statistics concerning the IPSec protocol connection between the WAN and the LAN. These statistics can be viewed on the IPSEC Statistics table, as shown below: Index This displays the sequence of the IPSec log. There are five categories of status that can be displayed here, as follows: BROKEN NEGOTIATION P1 NEGOTIATION P2 P1_ESTABLISHED P2_ESTABLISHED Description A brief description of the log entry will be displayed here.
Sys Log The DFL-600 can save or transmit Syslog messages to aid in network administration. You must have a Syslog application on one of the computers on your LAN to take advantage of this feature. Clicking on the Sys Log link will open the Sys Log configuration page, as shown below. Save Location Choose either the Remote Server or the Local Flash option.
Remote Server IP Sys Log Level Mail Alert SMTP Server IP Mail Subject Recipient E-mail Schedule Enter the IP address of the computer on your LAN that is running the Sys log application. This drop-down menu allows you to select the level of Sys log information that the DFL-600 will send to the Sys log server. This allows you to send syslog messages to an email address you specify below. This is the IP address of your Simple Mail Transfer Protocol (SMTP) server.
Status − Traffic Log Your DFL-600 keeps a log of the total number of bytes received and transmitted on to and from the LAN and WAN. This information can be displayed by clicking on the Traffic button to display the Traffic Statistics page, as shown below.
Connecting PCs to the DFL-600 Router If you do not wish to set the static IP address on your PC, you will need to configure your PC to request an IP address from the gateway. Click the Start button, select Settings then select Control Panel. Double-click the Network icon. In the configuration tab, select the TCP/IP protocol line that has been associated with your network card/adapter. If there is no TCP/IP line listed, you will need to install TCP/IP now.
Click the Properties button, then choose the IP Address tab. Select Obtain an IP address automatically. After clicking OK, windows might ask you to restart the PC. Click Yes. CONFIRM YOUR PC’S IP CONFIGURATION There are two tools which are great for finding out a computer’s IP configuration: MAC address and default gateway. • WINIPCFG (for Windows 95/98) Inside the windows 95/98 Start button, select Run and type winipcfg. In the example below this computer has an IP address of 192.168.0.
• IPCONFIG (for Windows 2000/NT/XP) In the DOS command prompt type IPCONFIG and press Enter. Your PC IP information will be displayed as shown below.
Networking Basics Using the Network Setup Wizard in Windows XP In this section you will learn how to establish a network at home or work, using Microsoft Windows XP. Note: Please refer to websites such as http://www.homenethelp.com and http://www.microsoft.com/windows2000 for information about networking computers using Windows 2000, ME or 98. Go to START>CONTROL PANEL>NETWORK CONNECTIONS Select Set up a home or small office network When this screen appears, Click Next.
Please follow all the instructions in this window: Click Next In the following window, select the best description of your computer. If your computer connects to the Internet through a gateway/router, select the second option as shown.
Click Next Enter a Computer description and a Computer name (optional.
Enter a Workgroup name. All computers on your network should have the same Workgroup name. Click Next Please wait while the wizard applies the changes.
When the changes are complete, Click Next. Please wait while the wizard configures the computer. This may take a few minutes.
In the window below, select the best option. In this example, “Create a Network Setup Disk” has been selected. You will run this disk on each of the computers on your network. Click Next.
Format the disk if you wish, and Click Next. Please wait while the wizard copies the files. Please read the information under Here’s how in the screen below. After you complete the Network Setup Wizard you will use the Network Setup Disk to run the Network Setup Wizard once on each of the computers on your network. To continue Click Next Please read the information on this screen, then Click Finish to complete the Network Setup Wizard.
The new settings will take effect when you restart the computer. Click Yes to restart the computer. You have completed configuring this computer. Next, you will need to run the Network Setup Disk on all the other computers on your network. After running the Network Setup Disk on all your computers, your new wireless network will be ready to use.
Naming your Computer Naming your computer is optional. If you would like to name your computer please follow these directions: In Windows XP: Click START (in the lower left corner of the screen) Right-click on My Computer Select Properties • Select the Computer Name Tab in the System Properties window. You may enter a Computer description if you wish, this field is optional.
• In this window, enter the Computer name. • Select Workgroup and enter the name of the Workgroup. • All computers on your network must have the same Workgroup name.
Assigning a Static IP Address Note: Residential Gateways/Broadband Routers will automatically assign IP Addresses to the computers on the network, using DHCP (Dynamic Host Configuration Protocol) technology. If you are using a DHCP-capable Gateway/Router you will not need to assign Static IP Addresses.
Right-click on Local Area Connections.
Select Use the following IP address in the Internet Protocol (TCP/IP) Properties window. Input your IP address and subnet mask. (The IP Addresses on your network must be within the same range. For example, if one computer has an IP Address of 192.168.0.2, the other computers should have IP Addresses that are sequential, like 192.168.0.3 and 192.168.0.4. The subnet mask must be the same for all the computers on the network.) Input your DNS server addresses.
You have completed the assignment of a Static IP Address. (You do not need to assign a Static IP Address if you have a DHCP-capable Gateway/Router.
Contacting Technical Support You can find the most recent software and user documentation on the D-Link website. D-Link provides free technical support for customers within the United States for the duration of the warranty period on this product. U.S. customers can contact D-Link technical support through our web site, or by phone. D-Link Technical Support over the Telephone: (800) 758-5489 24 hours a day, seven days a week. D-Link Technical Support over the Internet: http://support.dlink.
Limited Warranty and Registration D-Link Systems, Inc. (“D-Link”) provides this 1-Year warranty for its product only to the person or entity who originally purchased the product from: • • D-Link or its authorized reseller or distributor. Products purchased and delivered with the fifty United States, the District of Columbia, US Possessions or Protectorates, US Military Installations, addresses with an APO or FPO.
• After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. • The customer is responsible for all shipping charges to and from D-Link (No CODs allowed). Products sent COD will become the property of D-Link Systems, Inc. Products should be fully insured by the customer and shipped to D-Link Systems Inc.
• • • Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Register Your D-Link Product Online at http://www.dlink.