D-Link DFL-80 User Manual - Page 65

Policy

Page 65 highlights

Policy This section provides the Administrator with facilities to set control policies for packets with different source IP addresses, source ports, destination IP addresses, and destination ports. Control policies decide whether packets from different network objects, network services, and applications are able to pass through the Firewall. What is Policy? The DFL-80 uses policies to filter packets. The policy settings are: source address, destination address, services, permission, packet log, packet statistics, and flow alarm. Based on its source addresses, a packet can be categorized into: (1). Outgoing: A client is in the internal networks while a server is in the external networks. (2) Incoming: A client is in the external networks, while a server is in the internal networks. (3) To DMZ: A client is either in the internal networks or in the external networks while, server is in DMZ. (4) From DMZ: A client is in DMZ while server is either in the internal networks or in the external networks. How do I use Policy? The policy settings are source addresses, destination addresses, services, permission, log, statistics, and flow alarm. Among them, source addresses, destination addresses and IP mapping addresses have to be defined in the Address menu in advance. Services can be used directly in setting up policies, if they are in the Pre-defined Service menu. Custom services need to be defined in the Custom menu before they can be used in the policy settings. If the destination address of an incoming policy is a Mapped IP address or a Virtual Server address, then the address has to be defined in the Virtual Server section instead of the Address section. Step 1. Step 2. Step 3. Step 4. In Address, set names and addresses of source networks and destination networks. In Service, set services. In Virtual Server, set names and addresses of mapped IP or virtual server (only applied to Incoming policies). Set control policies in Policy 65

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

65
Policy
This section provides the Administrator with facilities to set control policies
for packets with different source IP addresses, source ports, destination IP
addresses, and destination ports.
Control policies decide whether packets
from different network objects, network services, and applications are able to
pass through the Firewall.
What is Policy?
The DFL-80 uses policies to filter packets.
The policy settings are: source
address, destination address, services, permission, packet log, packet statistics,
and flow alarm. Based on its source addresses, a packet can be categorized
into:
(1).
Outgoing: A client is in the internal networks while a server is in the
external networks.
(2)
Incoming: A client is in the external networks, while a server is in the
internal networks.
(3)
To DMZ: A client is either in the internal networks or in the external
networks while, server is in DMZ.
(4)
From DMZ: A client is in DMZ while server is either in the internal networks
or in the external networks.
How do I use Policy?
The policy settings are source addresses, destination addresses, services,
permission, log, statistics, and flow alarm. Among them, source addresses,
destination addresses and IP mapping addresses have to be defined in the
Address
menu in advance. Services can be used directly in setting up policies,
if they are in the Pre-defined Service menu. Custom services need to be defined
in the
Custom
menu before they can be used in the policy settings.
If the destination address of an incoming policy is a Mapped IP address or a
Virtual Server address, then the address has to be defined in the
Virtual Server
section instead of the
Address
section.
Step 1.
In
Address
, set names and addresses of
source networks and destination networks.
Step 2.
In
Service
, set services.
Step 3.
In
Virtual Server
, set names and addresses
of mapped IP or virtual server (only applied to
Incoming policies
).
Step 4.
Set control policies in
Policy