D-Link DFL-200 manual Services, Adding TCP, UDP or TCP/UDP Service

Page 39

Services

A service is basically a definition of a specific IP protocol with corresponding parameters. The service http, for instance, is defined as to use the TCP protocol with destination port 80.

Services are simplistic, in that they cannot carry out any action in the firewall on their own. Thus, a service definition does not include any information whether the service should be allowed through the firewall or not. That decision is made entirely by the firewall policies, in which the service is used as a filter parameter.

Adding TCP, UDP or TCP/UDP Service

For many services, a single destination port is sufficient. The http service, for instance, is using destination port 80. To use a single destination port, enter the port number in the destination ports text box. In most cases, all ports (0-65535) have to be used as source ports. The second option is to define a port range, a port range is inclusive, meaning that a range 137-139 covers ports 137, 138 and 139.

Multiple ranges or individual ports may also be entered, separated by commas. For instance, a service can be defined as having source ports 1024-65535 and destination ports 80-82, 90-92, 95. In this case, a TCP or UDP packet with the destination port being one of 80, 81, 82, 90, 91, 92 or 95, and the source port being in the range 1024-65535, will match this service.

Follow these steps to add a TCP, UDP or TCP/UDP service.

Step 1. Go to Firewall and Service and choose Add new.

Step 2. Enter a Name for the service in the name field. This name will appear in the service list when you add a new policy. The name can contain numbers (0-9) and upper and lower case letters (A-Z, a-z), and the special characters - and _. No other special characters and spaces are allowed.

Step 3. Select TCP/UDP Service.

Step 4. Select the protocol (either TCP, UDP or both TCP/UDP) used by the service.

Step 5. Specify a source port or range for this service by typing in the low and high port numbers. Enter 0-65535 for all ports, or a single port like 80 for only one source port.

Step 6. Specify a destination port or range for this service by typing in the low and high port numbers. Enter 0-65535 for all ports, or a single port like 80 for only one destination port.

Step 7. Enable the Syn Relay checkbox if you want to protect the destination from SYN flood attacks.

Click the Apply button below to apply the change or click Cancel to discard changes.

Image 39
Contents Link DFL-200 Contents VPN Servers 111 125 122Introduction to Firewalls Features and BenefitsAccess Control supported IntroductionIntroduction to Local Area Networking Physical Connections LEDsSystem Requirements Package ContentsManaging D-Link DFL-200 Resetting the DFL-200Administrative Access Administration SettingsAdd Admin access to an interface Add ping access to an interfaceEnable Snmp access to an interface Add Read-only access to an interfaceSystem InterfacesChange IP of the LAN or DMZ interface WAN Interface Settings Using Static IP WAN Interface Settings Using DhcpIP Address The IP address of the WAN interface. This is Password WAN Interface Settings Using PPPoEWAN Interface Settings Using Pptp WAN Interface Settings Using BigPond MTU ConfigurationPassword The password supplied to you by your ISP Routing Add a new Static Route Remove a Static RouteGo to System and Routing Logging Enable Logging Enable Audit LoggingEnable E-mail alerting for ISD/IDP events Page Time Checking the Set the system time box Using NTP to sync timeSetting time and date manually Changing time zoneAction Types FirewallPolicy Policy modesService Filter Source and Destination FilterSchedule Add a new policy Intrusion Detection / PreventionChange order of policy Configure Intrusion DetectionEnable the Delete policy checkbox Enable the Intrusion Detection / Prevention checkboxConfigure Intrusion Prevention Add a new mapping Port mapping / Virtual ServersDelete mapping Enable the Delete mapping checkboxDFL-200 Radius Support UsersEnable Radius Support Enable User Authentication via Http / HttpsChange User Password Enable the Change password checkboxAdd User Delete User Enable the Delete user checkboxAdd new recurring schedule SchedulesAdding TCP, UDP or TCP/UDP Service ServicesAdding IP Protocol Grouping ServicesProtocol-independent settings Introduction to IPSec VPNIntroduction to Pptp Introduction to L2TPPoint-to-Point Protocol MPPE, Microsoft Point-To-Point Encryption Authentication ProtocolsL2TP/PPTP Clients Authentication protocolL2TP/PPTP Servers Authentication Protocol Introduction chapterMppe encryption Creating a LAN-to-LAN IPSec VPN Tunnel VPN between two networksCreating a Roaming Users IPSec VPN Tunnel VPN between client and an internal networkAdding a L2TP/PPTP VPN Server Adding a L2TP/PPTP VPN ClientVPN Advanced Settings Proposal Lists IKE Proposal ListIPSec Proposal List Certificates of remote peers CertificatesTrusting Certificates Local identitiesIdentities Active content handling Content FilteringEdit the URL Global Whitelist Edit the URL Global Blacklist Active content handling Servers Dhcp Server SettingsEnable by checking the Use built-in Dhcp Server box Enable Dhcp ServerEnable Dhcp Relay Disable Dhcp Server/RelayerDNS Relayer Settings Enable DNS RelayerEnable by checking the Enable DNS Relayer box Disable DNS Relayer Ping ToolsAdd Dynamic DNS Settings Dynamic DNSPing Example Backup Exporting the DFL-200’s ConfigurationRestoring the DFL-200’s Configuration Restarting the DFL-200 Restart/ResetRestoring system settings to factory defaults Page Upgrade Upgrade FirmwareUpgrade IDS Signature-database Status SystemCPU Load Interfaces VPN Click Connections below it. a window will ConnectionsDhcp Server Logging Conn events How to read the logsUsage events Drop eventsClose Example Open ExampleStep by step guides LAN IP 192.168.4.1, Subnet mask LAN-to-LAN VPN using IPsecRemote Net 192.168.1.0/24 Enable Automatically add a route for the remote networkLocal net 192.168.1.0/24 LAN IP 192.168.1.1, Subnet maskRemote Net 192.168.4.0/24 LAN-to-LAN VPN using Pptp Username BranchOffice Click Global policy parameters Settings for Main office Page Under Users in local database click Add new Select Local databasePage LAN-to-LAN VPN using L2TP Username BranchOffice Check Use IPsec encryption Setup interfaces, System-Interfaces WAN IP193.0.2.20 Page Select Local database Under Users in local database click Add new More secure LAN-to-LAN VPN solution Page Page Settings for Main office Windows XP client and Pptp server Settings for the Windows XP clientSelect Connect to the network at my workplace and click Next Select Virtual Private Network connection and click Next Name the connection MainOffice and click Next 104 Select Do not dial the initial connection and click Next Page Click Properties Page Name the new user HomeUser Enter password Retype password Page Windows XP client and L2TP server 112 Settings for Main office Page Content filtering Select HTTP/HTML Content Filtering in the ALG dropdown Firewall-ServicesPage Page Intrusion detection and prevention Page Check Enable E-mail alerting for IDS/IDP events Appendix a Icmp Types and Codes AppendixesPage ESP Appendix B Common IP Protocol NumbersLimited Warranty What Is Not Covered Wichtige Sicherheitshinweise Attenzione CE Mark WarningWarnung Advertencia de Marca de la CEVcci Warning Offices Singapore D-LINK International 132
Related manuals
Manual 14 pages 8.62 Kb Manual 12 pages 24 Kb