D-Link DRO-210i manual Intrusion Detection, IDS Configuration

Page 46

Firewall

7.2 Intrusion Detection

An Intrusion is a deliberate, unauthorized attempt to access or manipulate information or system and to render them unreliable or unusable. The security architecture that detects and prevents these types of intrusion is called Intrusion Detection and Prevention System.

Intrusion Detection Systems (IDS) detect unwanted access to devices on the private network mainly from the public Internet. The manipulations may take the form of attacks by skilled malicious hackers or by using automated tools. IDS detect all types of malicious network traffic and computer usage that can not be detected by a conventional firewall. So Intrusion Detection is an important technology for routers to identify and prevent these threats from affecting the devices on the network.

IDS and Firewall both are ways to enhance security in a networking environment but they function differently. Firewall limits the flow of packets between networks to prevent intrusion and do not look for a pattern that signifies an attack. An IDS detects a potential security breach, logs the information and signals an alert to the operator. It matches the packets against a ‘signature’. A signature is a pattern observed in a previous intrusion attack by examining the network communications and identifying heuristics of that attack.

In order to make IDS effective and reliable, the router implements three levels of processing:

￿Intrusion Detection Rules: An Intrusion Detection Rule defines the kind of traffic should be analyzed. Filtering fields regarding source and destination interfaces, networks, ports, and protocols are also defined here. Only traffic matching this rule is passed on to the next processing level of IDS, where actual analysis takes place.

￿Pattern Matching: In order to correctly identify an attack, pre-defined patterns called “signatures”, are created that describe certain attacks. The network traffic is then analyzed by the IDS, searching for these patterns. This is also known as “misuse detection” or “signature detection”.

￿Action: If an intrusion or attack has been detected, the router logs the attack and takes an action or response. Depending on the severity of the attack, traffic can be blacklisted to prevent further attacks, or just dropped.

7.2.1 IDS Configuration

Certain sessions between computers on your LAN and the WAN have the potential to cause a disruption the functioning of your LAN computers and are blocked by the Router's IDS Engine. The signatures for these attacks are pre-defined by the factory and are the commonly used intrusion methods. The IDS feature in this router can detect and block these well-known network attacks.

Dlink DRO-210i User Guide

46

Image 46
Contents DRO-210i Table Of Contents Virtual Private Network About This Manual BoldProduct Overview Product OverviewDlink DRO-210i User Guide DRO-210i Package Contents Hardware DetailsFront Panel Rear Panel Software Features RoutingVPN Tools Disabled WAN2/DMZ Port ConfigurationOptional Port Configuration InterfacesDMZ Interface LAN SettingsLAN Interface Forgot LAN IP ?WAN Interface DMZ SettingsMaximum Transmission Unit IP Settings for WAN1 Interface Static ModeDynamic Mode Dhcp Settings for WAN1 InterfacePPPoE Mode Unnumbered InterfacesPPPoE Settings for WAN1 Interface Dhcp Server DHCP, DNS and TimeDhcp DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy Settings DNS ProxySystem Time Settings TimeRouting RoutingDynamic Routing Static RoutingStatic Routing RIP Settings Routing Table Routing TablePolicy Based Routing Policy Based RoutingTo the same destination High Availability Auto BackupBackup Configuration High AvailabilityLoad Balancing Load Balancing ConfigurationEthernet Link Detection Ethernet WAN Link Detection Network Address Translation NAT Interface ConfigurationNAT Interface Configuration NATNAT Configuration NAT ConfigurationNAT Exception NAT Exception Virtual ServerVirtual Server/NAPT SIP ALG Configuration SIP-ALGNAT Table NAT Session TableFirewall Interface ConfigurationFirewall Interface Configuration Firewall PoliciesPolicy Rules Policy RulesInbound Policies Permitted ServicesInbound Policies Permitted Services Inbound PoliciesIP Permitted Rules Outbound PoliciesAdd Permitted IP Rule Outbound Policies Outbound PoliciesIP Blocked Rules Blocked ServicesOutbound Policies Service Blocked Rule Add Blocked IP RuleOutbound Policies Untrusted Domain Domain FilterUntrusted Domain Trusted DomainCookie Filter Web FilterJava Filter ActiveX FilterKeyword Exception Keyword FilterFile Extension Filter Add Blocked MAC Address MAC FilterBlocking Log Blocking Log TableIDS Configuration Intrusion DetectionIDS Configuration Intrusion Log Table Intrusion LogBlack List Black List TableVirtual Private Network Virtual Private NetworkIPSec Passthrough IPSec Tunnel or PassthroughPeer-To-Peer IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server Configurations IPSec ServerMaximum life duration is 86400 seconds Tunnel Table Tunnel Remote ID ConfigurationLimitation IPSec Status IPSec StatusIPSec Log IPSec Log TableQuality of Service Quality of ServiceClass Configuration HTB QoS ConfigurationsQuality of Service Filter Configuration QoS Filter ConfigurationsType Of Service/DiffServ TOS/DiffServQuality of Service Device Information AdministrationAdministration Device InfoSession Log Traffic StatisticsTraffic Statistics Session Log Password ChangeSysLog System LogSystem Change PasswordPassword Recovery SystemUpdate Firmware/Configuration Upload/DownloadPing Test Remote AccessRemote Access Ping TestAdministration Dlink DRO-210i User Guide Frequently Asked Questions Frequently Asked QuestionsGeneral Q6. What is the purpose of Dhcp Server Auto Configuration? DHCP, DNSRouting High AvailabilityFirewall Frequently Asked Questions 11.6 NAT Q21. What are the call features supported by SIP-ALG? 11.7 VPN11.8 QoS Frequently Asked Questions

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.