D-Link DIR-625 manual Firewall Settings

Page 43

Section 3 - Configuration

Firewall Settings

A firewall protects your network from the outside world. The D-Link DIR-625 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.

 

Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet

 

 

 

filtering) helps to prevent cyber attacks by tracking more state per

 

 

 

session. It validates that the traffic passing through the session

 

 

 

conforms to the protocol.

 

 

NAT Endpoint

Select one of the following for TCP and UDP ports:

 

 

Filtering: Endpoint Independent - Any incoming traffic sent to an open port

 

 

 

will be forwarded to the application that opened the port. The port

 

 

 

will close if idle for 5 minutes.

 

 

 

Address Restricted - Incoming traffic must match the IP address

 

 

 

of the outgoing connection.

 

 

 

Address + Port Restriction - Incoming traffic must match the IP

 

 

 

address and port of the outgoing connection.

 

Enable DMZ Host: If an application has trouble working from behind the router, you

 

 

 

can expose one computer to the Internet and run the application

 

 

 

on that computer.

 

 

 

Note: Placing a computer in the DMZ may expose that computer to

 

 

 

a variety of security risks. Use of this option is only recommended

 

 

 

as a last resort.

 

 

IP Address: Specify the IP address of the computer on the LAN that you want to

 

 

 

have unrestricted Internet communication. If this computer obtains

 

 

 

it’s IP address automatically using DHCP, be sure to make a static

 

 

 

reservation on the Basic > DHCP page so that the IP address of

 

 

 

the DMZ machine does not change.

 

 

 

 

 

D-Link DIR-625 User Manual

43

Image 43
Contents Page Table of Contents Warranty Registration Wireless SecurityProductPackageOverviewContents Total Performance IntroductionFeatures Connections Hardware OverviewInternet LED LEDsBefore you Begin InstallationWireless Installation Considerations Connect to Cable/DSL/Satellite Modem Connect to Another Router Installation Web-based Configuration Utility ConfigurationClick Launch Internet Connection Setup Wizard to begin Setup WizardConfiguration Configuration Configuration Dynamic Cable Manual ConfigurationPPPoE DSL Internet SetupPptp Page L2TP Page Static assigned by ISP Big Pond Wireless Settings Visibility Status Network Settings Dhcp Server Settings Dhcp Reservation Virtual Server Configuration Port Forwarding Application Rules Speed QoS EngineNetwork Filters Access Control Access Control Wizard Access Control Wizard Website Filters Inbound Filters Firewall Settings Application Level Gateway ALG Configuration Transmit Power Set the transmit power of the antennas Advanced Wireless SettingsAdvanced Network Settings Administrator Settings Time Settings SysLog Server SysLog Server SysLogAuthentication authentication Email SettingsSystem Settings Check Email Notification of Newer Firmware Update FirmwareDdns System Check Schedules Device Information Log Active Sessions StatsSupport WirelessWhat is WEP? Wireless SecurityWhat is WPA? Wireless Security Setup Wizard Security Security Configure WEP Configure WPA-Personal PSK Configure WPA-Enterprise Radius Security Using Windows XP Connect to a Wireless NetworkConfigure WEP Connecting to a Wireless Network Configure WPA-PSK Connecting to a Wireless Network Why can’t I access the web-based configuration utility? TroubleshootingWhat can I do if I forgot my password? Troubleshooting Troubleshooting Wireless Basics Wireless Local Area Network Wlan What is Wireless?Home Wireless Personal Area Network WpanSmall Office and Home Office Eliminate Interference Centralize your router or Access PointSecurity Wireless ModesCheck your IP address Networking BasicsStep Highlight Internet Protocol TCP/IP and click Properties StepMSC Dimensions Technical SpecificationsPhone Support Contacting Technical SupportLimited Warranty WarrantyNon-Applicability of Warranty Limited Software WarrantyDisclaimer of Other Warranties What Is Not CoveredCopyright Statement Limitation of LiabilityGoverning Law TrademarksFCC Statement CE Mark WarningFCC Caution IC Radiation Exposure Statement IC statementRegistration