D-Link DFL-1100 Product Manual - Page 7

Introduction - dfl hardware firewall

Page 7 highlights

Introduction The DFL-1100 provides four 10/100Mbps Ethernet network interface ports, which are (1) Internal/LAN, (1) External/WAN, (1) DMZ, and (1) ETH4 port. In addition the DFL-1100 also provides a user-friendly Web UI that allows users to set system parameters or monitor network activities using a Web browser supporting Java. Features and Benefits Firewall Security High Availability Through the use of the Sync port (ETH4) two DFL-1100's can form a High Availability cluster that will fail over Firewall and VPN sessions. VPN Server/Client Supported Supports IPSec LAN-to-LAN or Roaming user tunnels with AES encryption in addition to PPTP and IPSec over L2TP Content Filtering Strip ActiveX objects, Java Applets, JavaScript, and VBScript from HTTP traffic Bandwidth Management DFL-1100 features an extensive Traffic Shaper for bandwidth management. Web Management Configurable through any networked computer's Web browser using Netscape or Internet Explorer. Access Control supported Allows assignment of different access rights for different users, such as Admin or Read-Only User. Introduction to Firewalls A firewall is a device that sits between your computer and the Internet that prevents unauthorized access to or from your network. A firewall can be a computer using firewall software or a special piece of hardware built specifically to act as a firewall. In most circumstances, a firewall is used to prevent unauthorized Internet users from accessing private networks or corporate LAN's and Intranets. Firewalls are also deployed to prevent sensitive information about your network from leaking out of your network. A firewall monitors all of the information moving to and from your network and analyzes each piece of data. Each piece of data is then checked against a set of criteria configured by the administrator. If any data does not meet the criteria, that data is blocked and discarded. If the data meets the criteria, the data is passed through. This method is called packet filtering. A firewall can also run specific security functions based on the type of application or type of port that is being used. For example, a firewall can be configured to work with an FTP or Telnet server. Or a firewall can be configured to work with specific UDP or TCP ports to allow certain applications or games to work properly over the Internet.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

Introduction
The DFL-1100 provides four 10/100Mbps Ethernet network interface ports, which are (1)
Internal/LAN, (1) External/WAN, (1) DMZ, and (1) ETH4 port. In addition the DFL-1100 also
provides a user-friendly Web UI that allows users to set system parameters or monitor
network activities using a Web browser supporting Java.
Features and Benefits
z
Firewall Security
z
High Availability
Through the use of the Sync port (ETH4) two DFL-1100’s can form a
High Availability cluster that will fail over Firewall and VPN sessions.
z
VPN Server/Client Supported
Supports IPSec LAN-to-LAN or Roaming user tunnels with AES
encryption in addition to PPTP and IPSec over L2TP
z
Content Filtering
Strip ActiveX objects, Java Applets, JavaScript, and VBScript from
HTTP traffic
z
Bandwidth Management
DFL-1100 features an extensive Traffic Shaper for bandwidth
management.
z
Web Management
Configurable through any networked computer’s Web browser using
Netscape or Internet Explorer.
z
Access Control supported
Allows assignment of different access rights for different users, such
as Admin or Read-Only User.
Introduction to Firewalls
A firewall is a device that sits between your computer and the Internet that prevents
unauthorized access to or from your network. A firewall can be a computer using firewall
software or a special piece of hardware built specifically to act as a firewall. In most
circumstances, a firewall is used to prevent unauthorized Internet users from accessing
private networks or corporate LAN’s and Intranets.
Firewalls are also deployed to prevent
sensitive information about your network from leaking out of your network.
A firewall monitors all of the information moving to and from your network and analyzes
each piece of data. Each piece of data is then checked against a set of criteria configured by
the administrator. If any data does not meet the criteria, that data is blocked and discarded. If
the data meets the criteria, the data is passed through. This method is called packet filtering.
A firewall can also run specific security functions based on the type of application or type
of port that is being used. For example, a firewall can be configured to work with an FTP or
Telnet server. Or a firewall can be configured to work with specific UDP or TCP ports to allow
certain applications or games to work properly over the Internet.