D-Link DFL-200 CE Mark Warning, Warnung, Advertencia de Marca de la CE, Attenzione, FCC Warning

Page 128

einzusetzen.

Trademarks

Copyright .2002 D-Link Corporation. Contents subject to change without prior notice. D-Link is a registered trademark of D-Link Corporation/D-Link Systems, Inc. All other trademarks belong to their respective proprietors.

Copyright Statement

No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from D-Link Corporation/D-Link Systems Inc., as stipulated by the United States Copyright Act of 1976.

CE Mark Warning

This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures

Warnung!

Dies ist in Produkt der Klasse B. Im Wohnbereich kann dieses Produkt Funkstoerungen verursachen. In diesem Fall kann vom Benutzer verlangt werden, angemessene Massnahmen zu ergreifen.

Advertencia de Marca de la CE

Este es un producto de Clase B. En un entorno doméstico, puede causar interferencias de radio, en cuyo case, puede requerirse al usuario para que adopte las medidas adecuadas.

Attention!

Ceci est un produit de classe B. Dans un environnement domestique, ce produit pourrait causer des interférences radio, auquel cas l`utilisateur devrait prendre les mesures adéquates.

Attenzione!

Il presente prodotto appartiene alla classe B. Se utilizzato in ambiente domestico il prodotto può causare interferenze radio, nel cui caso è possibile che l`utente debba assumere provvedimenti adeguati.

FCC Warning

This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

-Reorient or relocate the receiving antenna.

-Increase the separation between the equipment and receiver.

-Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

-Consult the dealer or an experienced radio/ TV technician for help.

128

Image 128
Contents Link DFL-200 Contents VPN Servers 111 122 125Features and Benefits Access Control supportedIntroduction Introduction to FirewallsIntroduction to Local Area Networking LEDs Physical ConnectionsPackage Contents System RequirementsResetting the DFL-200 Managing D-Link DFL-200Administration Settings Administrative AccessAdd ping access to an interface Add Admin access to an interfaceAdd Read-only access to an interface Enable Snmp access to an interfaceChange IP of the LAN or DMZ interface SystemInterfaces IP Address The IP address of the WAN interface. This is WAN Interface Settings Using Static IPWAN Interface Settings Using Dhcp WAN Interface Settings Using PPPoE PasswordWAN Interface Settings Using Pptp Password The password supplied to you by your ISP WAN Interface Settings Using BigPondMTU Configuration Routing Go to System and Routing Add a new Static RouteRemove a Static Route Logging Enable E-mail alerting for ISD/IDP events Enable LoggingEnable Audit Logging Page Time Using NTP to sync time Setting time and date manuallyChanging time zone Checking the Set the system time boxFirewall PolicyPolicy modes Action TypesSchedule Service FilterSource and Destination Filter Intrusion Detection / Prevention Add a new policyConfigure Intrusion Detection Enable the Delete policy checkboxEnable the Intrusion Detection / Prevention checkbox Change order of policyConfigure Intrusion Prevention Port mapping / Virtual Servers Add a new mappingEnable the Delete mapping checkbox Delete mappingUsers DFL-200 Radius SupportEnable User Authentication via Http / Https Enable Radius SupportAdd User Change User PasswordEnable the Change password checkbox Enable the Delete user checkbox Delete UserSchedules Add new recurring scheduleServices Adding TCP, UDP or TCP/UDP ServiceGrouping Services Adding IP ProtocolProtocol-independent settings VPN Introduction to IPSecPoint-to-Point Protocol Introduction to PptpIntroduction to L2TP Authentication Protocols MPPE, Microsoft Point-To-Point EncryptionAuthentication protocol L2TP/PPTP ClientsAuthentication Protocol Introduction chapter L2TP/PPTP ServersMppe encryption VPN between two networks Creating a LAN-to-LAN IPSec VPN TunnelVPN between client and an internal network Creating a Roaming Users IPSec VPN TunnelAdding a L2TP/PPTP VPN Client Adding a L2TP/PPTP VPN ServerVPN Advanced Settings IPSec Proposal List Proposal ListsIKE Proposal List Certificates Trusting CertificatesLocal identities Certificates of remote peersIdentities Content Filtering Active content handlingEdit the URL Global Whitelist Edit the URL Global Blacklist Active content handling Dhcp Server Settings ServersEnable Dhcp Server Enable Dhcp RelayDisable Dhcp Server/Relayer Enable by checking the Use built-in Dhcp Server boxEnable by checking the Enable DNS Relayer box DNS Relayer SettingsEnable DNS Relayer Disable DNS Relayer Tools PingPing Example Add Dynamic DNS SettingsDynamic DNS Restoring the DFL-200’s Configuration BackupExporting the DFL-200’s Configuration Restart/Reset Restarting the DFL-200Restoring system settings to factory defaults Page Upgrade IDS Signature-database UpgradeUpgrade Firmware CPU Load StatusSystem Interfaces VPN Connections Click Connections below it. a window willDhcp Server Logging How to read the logs Usage eventsDrop events Conn eventsOpen Example Close ExampleStep by step guides LAN-to-LAN VPN using IPsec LAN IP 192.168.4.1, Subnet maskEnable Automatically add a route for the remote network Remote Net 192.168.1.0/24LAN IP 192.168.1.1, Subnet mask Local net 192.168.1.0/24Remote Net 192.168.4.0/24 LAN-to-LAN VPN using Pptp Username BranchOffice Click Global policy parameters Settings for Main office Page Select Local database Under Users in local database click Add newPage LAN-to-LAN VPN using L2TP Username BranchOffice Check Use IPsec encryption Setup interfaces, System-Interfaces WAN IP193.0.2.20 Page Select Local database Under Users in local database click Add new More secure LAN-to-LAN VPN solution Page Page Settings for Main office Settings for the Windows XP client Windows XP client and Pptp serverSelect Connect to the network at my workplace and click Next Select Virtual Private Network connection and click Next Name the connection MainOffice and click Next 104 Select Do not dial the initial connection and click Next Page Click Properties Page Name the new user HomeUser Enter password Retype password Page Windows XP client and L2TP server 112 Settings for Main office Page Content filtering Firewall-Services Select HTTP/HTML Content Filtering in the ALG dropdownPage Page Intrusion detection and prevention Page Check Enable E-mail alerting for IDS/IDP events Appendixes Appendix a Icmp Types and CodesPage Appendix B Common IP Protocol Numbers ESPLimited Warranty What Is Not Covered Wichtige Sicherheitshinweise CE Mark Warning WarnungAdvertencia de Marca de la CE AttenzioneVcci Warning Offices Singapore D-LINK International 132
Related manuals
Manual 14 pages 8.62 Kb Manual 12 pages 24 Kb