D-Link DFL-80 User Manual - Page 4

Introduction

Page 4 highlights

Introduction The DFL-80 provides six 10/100Mbit Ethernet network interface ports which are (4) Internal/LAN, (1) External/WAN, and (1) DMZ port. It also provides an easily operated software WebUI which allows users to set system parameters or monitor network activities using a web browser. DFL-80 security feature Some functions that are available in the firewall are: Packet Filter, Proxy Server, Intruder Alarm, Packet Monitor Log, Inbound/Outbound Policy, etc. DFL-80 installation This product is a hardware firewall. Therefore the installation is much easier than a software firewall. First the user has to prepare four network cables, and connect them to the internal, external and DMZ connectors respectively. The LAN interfaces has to connect to the internal network. The external interface has to connect with an external router, DSL modem, or Cable modem. The DMZ interface connects to an independent HUB/Switch for the DMZ network. DFL-80 function setting The DFL-80 Firewall has a built-in WEBUI (Web User Interface). All configurations and management are done through the WEBUI using an Internet web browser. DFL-80 monitoring function The firewall provides monitoring functions which contains traffic log, event log, traffic alarm, event alarm, and traffic statistics. Traffic alarm records the packets of intruder invasions. Not only does the firewall log these attacks, it can be set up to send E-mail alerts to the Administrator automatically for immediate intruder's invasion crisis management. DFL-80 supporting protocols The DFL-80 supports all the TCP, UDP and ICMP protocols, such as HTTP, TELNET, SMTP, POP3, FTP, DNS, PING, etc. System Administrators can set up proprietary protocols according to operating requirements. 4

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

4
Introduction
The DFL-80 provides six 10/100Mbit Ethernet network interface ports which
are (4) Internal/LAN, (1) External/WAN, and (1) DMZ port. It also provides an
easily operated software WebUI which allows users to set system parameters
or monitor network activities using a web browser.
DFL-80 security feature
Some functions that are available in the firewall are: Packet Filter, Proxy Server,
Intruder Alarm, Packet Monitor Log, Inbound/Outbound Policy, etc.
DFL-80 installation
This product is a hardware firewall. Therefore the installation is much easier
than a software firewall. First the user has to prepare four network cables,
and connect them to the internal, external and DMZ connectors respectively.
The LAN interfaces has to connect to the internal network. The external interface
has to connect with an external router, DSL modem, or Cable modem.
The
DMZ interface connects to an independent HUB/Switch for the DMZ network.
DFL-80 function setting
The DFL-80 Firewall has a built-in WEBUI (Web User Interface).
All
configurations and management are done through the WEBUI using an Internet
web browser.
DFL-80 monitoring function
The firewall provides monitoring functions which contains traffic log, event
log, traffic alarm, event alarm, and traffic statistics. Traffic alarm records the
packets of intruder invasions. Not only does the firewall log these attacks, it
can be set up to send E-mail alerts to the Administrator automatically for
immediate intruder’s invasion crisis management.
DFL-80 supporting protocols
The DFL-80 supports all the TCP, UDP and ICMP protocols, such as HTTP,
TELNET, SMTP, POP3, FTP, DNS, PING, etc. System Administrators can
set up proprietary protocols according to operating requirements.