D-Link DIR-68 manual Firewall Settings

Page 48

Section 3 - Configuration

Firewall Settings

A firewall protects your network from the outside world. The D-Link DIR-628 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.

Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol.

NAT Endpoint Select one of the following for TCP and UDP ports:

Filtering: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes.

Address Restricted - Incoming traffic must match the IP address of the outgoing connection.

Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection.

Anti-Spoof Check: Enable this feature to protect your network from certain kinds of “spoofing” attacks.

Enable DMZ: If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer.

Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.

DMZ IP Address: Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change.

D-Link DIR-628 User Manual

48

Image 48
Contents Page Preface Manual RevisionsTrademarks Table of Contents Wireless Security Troubleshooting Wireless BasicsTechnical Specifications Networking BasicsProductPackageOverviewContents System Requirements Browser RequirementsIntroduction Total PerformanceFeatures Hardware Overview ConnectionsLEDs WCN LEDInstallation Before you BeginWireless Installation Considerations Connect to Cable/DSL/Satellite Modem Turn on your computerConnect to Another Router Installation Getting Started Configuration Web-based Configuration UtilitySetup Wizard Click Internet Connection Setup Wizard to beginConfiguration Configuration Configuration Manual Configuration Dynamic CableInternet Setup ConnectionPptp Page L2TP Page Static assigned by ISP Wireless Settings Mode 2.4GHzChannel Scan Network Settings IP Address Subnet Mask Device NameDhcp Server Settings Type Secondary Wins IP AddressDhcp Reservation ClientsPage Virtual Server Configuration Port Forwarding Application Rules Enable Traffic Traffic Shaping QoS EngineClassification Network Filters Access Control Access Control Wizard Access Control Wizard Website Filters Add Website Select Allow or Deny Filtering RuleInbound Filters Firewall Settings Application Level Gateway Configuration Routing Advanced Wireless Settings Wi-Fi Protected Setup DefaultDevice Wizard Advanced Network Settings UPnPInbound Filter Administrator Settings Time Settings SysLog Check this box to send the router logs to a SysLog ServerEmail Settings Enable Email Notification From Email AddressAccount Name Password On Log Full On Schedule Smtp Server AddressSystem Settings File name for the settingsUpdate Firmware Ddns System Check Schedules Device Information Apply Log Settings Refresh LogSave Log Stats Internet Sessions Page Wireless Support Wireless Security What is WPA?Wireless Security Setup Wizard Launch Wireless Security Setup WizardIf you selected Manually, the following screen will appear Add Wireless Device with WPS Wizard Configure WPA-Personal PSK Configure WPA-Enterprise Radius Security Connect to a Wireless Network Using Windows VistaConfigure Wireless Security Security Connect Using WCN 2.0 in Windows Vista Using Windows XP Configure WPA-PSK Connecting to a Wireless Network Troubleshooting Why can’t I access the web-based configuration utility?What can I do if I forgot my password? Troubleshooting Troubleshooting Wireless Basics Wireless Local Area Network Wlan Wireless Personal Area Network WpanHome Small Office and Home OfficeCentralize your router or Access Point Eliminate InterferenceSecurity Wireless Modes Networking Basics Check your IP addressStep Step Highlight Internet Protocol TCP/IP and click PropertiesTechnical Specifications Wireless Signal Rates1 Ieee 802.11n draft 2.0 HT20/HT40CE Mark Warning FCC StatementFCC Caution IC statement IC Radiation Exposure Statement