Fw1000 Series Firewall
Fw1000 Series Firewall
i
Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support.
If you need any help, please contact Hangzhou DPtech Technologies Co., Ltd. and its sale agent, according to where
you purchase their products.
ii
Declaration
Copyright 2011
Hangzhou DPtech Technologies Co., Ltd.
All rights reserved.
No Part of the manual can be extracted or copied by any company or individuals without written permission, and can
not be transmitted by any means.
Owing to product upgrading or other reasons, information in this manual is subject to change. Hangzhou DPtech
Technologies Co., Ltd. has the right to modify the content in this manual, as it is a user guides, Hangzhou DPtech
Technologies Co., Ltd. made every effort in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute the warranty of any kind
express or implied.
iii
Table of Contents
CHAPTER 1 PRODUCT OVERVIEW 1-5
viii
CHAPTER 7 ACCESS CONTROL 7-195
x
12.2 OVERFLOW 12-257
12.2.1 OVERFLOW PROTECT 12-257
12.3 HOT STANDBY 12-257
12.3.1 HOT STANDBY 12-257
12.3.2 HANDWORK SYNCHRONIZATION 12-258
12.3.3 BACKUP REBOOT 12-258
12.3.4 INTERFACE SYNCHRONIZATION GROUP 12-259
List of Figures
Figure1-1 WEB Management Interface .................................................................................................................. 1-6
Figure1-2 Deploying of WEB Interface ................................................................................................................. 1-7
Figure2-1 System menu .......................................................................................................................................... 2-9
Figure2-2 Device information .............................................................................................................................. 2-10
Figure2-3 Device status ........................................................................................................................................ 2-11
Figure2-4 Device information settings ................................................................................................................. 2-12
Figure2-5 System name ........................................................................................................................................ 2-12
Figure2-6 System time settings ............................................................................................................................ 2-13
Figure2-7 System threshold .................................................................................................................................. 2-13
Figure2-8 Enable remote diagnostics ................................................................................................................... 2-14
Figure2-9 Set frame gap ....................................................................................................................................... 2-14
Figure2-10 System parameter ............................................................................................................................... 2-15
Figure2-11 Clear database .................................................................................................................................... 2-15
Figure2-12 SNMP................................................................................................................................................. 2-16
Figure2-13 Device information ............................................................................................................................ 2-17
Figure2-14 SNMP version configuration ............................................................................................................. 2-18
Figure2-15 IP address list ..................................................................................................................................... 2-18
Figure2-16 Alarm ................................................................................................................................................. 2-19
Figure2-17 Alarm_stat .......................................................................................................................................... 2-19
Figure2-18 History ............................................................................................................................................... 2-20
Figure2-19 History_stat ........................................................................................................................................ 2-20
Figure2-20 RMON log ......................................................................................................................................... 2-21
Figure2-21 Current administrator ......................................................................................................................... 2-21
Figure2-22 Administrator settings ........................................................................................................................ 2-22
Figure2-23 Administrator authentication settings ................................................................................................ 2-24
Figure2-24 Login parameter settings .................................................................................................................... 2-26
Figure2-25 Authority management ....................................................................................................................... 2-27
Figure2-26 WEB access protocol ......................................................................................................................... 2-28
Figure2-27 Interface service ................................................................................................................................. 2-29
Figure2-28 Remote user ....................................................................................................................................... 2-29
Figure2-29 Configuration file ............................................................................................................................... 2-31
Figure2-30 Hot patching ....................................................................................................................................... 2-33
Figure2-31 APP signature..................................................................................................................................... 2-33
Figure2-32 Signature version information ............................................................................................................ 2-33
Figure2-33 Auto-upgrade settings ........................................................................................................................ 2-34
Figure2-34 Manual upgrade ................................................................................................................................. 2-35
xi
Figure2-35 Upgrade progress interface ................................................................................................................ 2-36
Figure2-36 URL classification filtering signature ................................................................................................ 2-36
Figure2-37 Signature version information ............................................................................................................ 2-37
Figure2-38 Auto-upgrade settings ........................................................................................................................ 2-37
Figure2-39 Manual upgrade ................................................................................................................................. 2-38
Figure2-40 Upgrade progress interface ................................................................................................................ 2-39
Figure2-41 AV signature ...................................................................................................................................... 2-39
Figure2-42 IPS signature ...................................................................................................................................... 2-40
Figure2-43 License management .......................................................................................................................... 2-40
Figure2-44 Software version ................................................................................................................................ 2-41
Figure2-45 NTP configuration ............................................................................................................................. 2-42
Figure2-46 NTP client configuration.................................................................................................................... 2-43
Figure2-47 Virtual management system ............................................................................................................... 2-44
Figure2-48 Virtual management system parameter settings ................................................................................. 2-44
Figure2-49 OVC configuration............................................................................................................................. 2-45
Figure2-50 Virtual system .................................................................................................................................... 2-45
Figure2-51 Certification configuration ................................................................................................................. 2-46
Figure2-52 Device information configuration ...................................................................................................... 2-47
Figure2-53 CA server configuration ..................................................................................................................... 2-48
Figure2-54 CRL server configuration................................................................................................................... 2-49
Figure2-55 Certificate management ..................................................................................................................... 2-50
Figure2-56 Key management ............................................................................................................................... 2-50
Figure2-57 Certificate application ........................................................................................................................ 2-51
Figure2-58 Certificate management ..................................................................................................................... 2-51
Figure2-59 CRL management .............................................................................................................................. 2-52
Figure2-60 Install option ...................................................................................................................................... 2-52
Figure2-61 Management center ............................................................................................................................ 2-53
Figure3-1 Manage center ...................................................................................................................................... 3-55
Figure3-2 Networking configuration .................................................................................................................... 3-56
Figure3-3 VLAN Interface configuration ............................................................................................................. 3-56
Figure3-4 VLAN frame manage ........................................................................................................................... 3-57
Figure3-5 Interface configuration ......................................................................................................................... 3-57
Figure3-6 Interface rate beyond warning.............................................................................................................. 3-58
Figure3-7 Port aggregation configuration............................................................................................................. 3-58
Figure3-8 Aggregation group status ..................................................................................................................... 3-58
Figure3-9 Local mirroring .................................................................................................................................... 3-59
Figure3-10 Remote source mirroring ................................................................................................................... 3-59
Figure3-11 Remote destination mirroring ............................................................................................................ 3-59
Figure3-12 Sub interface configuration ................................................................................................................ 3-60
Figure3-13 Loopback interface configuration ...................................................................................................... 3-60
Figure3-14 PPP interface configuration ............................................................................................................... 3-60
Figure3-15 Template interface ............................................................................................................................. 3-60
Figure3-16 IPsec interface .................................................................................................................................... 3-61
Figure3-17 GRE ................................................................................................................................................... 3-61
Figure3-18 3G dial-up .......................................................................................................................................... 3-61
Figure3-19 Security zone ...................................................................................................................................... 3-62
Figure3-20 Network diagram for configuring security zones............................................................................... 3-63
xii
Figure3-21 IP address object ................................................................................................................................ 3-65
Figure3-22 IP address object group ...................................................................................................................... 3-65
Figure3-23 IPv6 address ....................................................................................................................................... 3-66
Figure3-24 MAC address ..................................................................................................................................... 3-67
Figure3-25 MAC address group ........................................................................................................................... 3-67
Figure3-26 MAC address manage ........................................................................................................................ 3-68
Figure3-27 Account user ...................................................................................................................................... 3-68
Figure3-28 Domain name ..................................................................................................................................... 3-69
Figure3-29 Predefined service object ................................................................................................................... 3-70
Figure3-30 User-defined service object ................................................................................................................ 3-70
Figure3-31 Service object group .......................................................................................................................... 3-70
Figure3-32 Forwarding ......................................................................................................................................... 3-71
Figure3-33 Forwarding mode ............................................................................................................................... 3-71
Figure3-34 Neighbor discover .............................................................................................................................. 3-71
Figure3-35 DS_Lite .............................................................................................................................................. 3-72
Figure3-36 6to4 tunnel ......................................................................................................................................... 3-72
Figure3-37 Stateless configuration ....................................................................................................................... 3-73
Figure3-38 Configure static route ......................................................................................................................... 3-74
Figure3-39 Health check....................................................................................................................................... 3-75
Figure3-40 Basic routing table ............................................................................................................................. 3-76
Figure3-41 Detailed routing table ......................................................................................................................... 3-77
Figure3-42 Equal-cost route ................................................................................................................................. 3-78
Figure3-43 Configure BGP................................................................................................................................... 3-78
Figure3-44 Configure BGP-VPN ......................................................................................................................... 3-80
Figure3-45 BGP neighbor information ................................................................................................................. 3-81
Figure3-46 Configure RIP .................................................................................................................................... 3-82
Figure3-47 Display RIP state................................................................................................................................ 3-83
Figure3-48 Configure OSPF ................................................................................................................................. 3-84
Figure3-49 OSPF interface information ............................................................................................................... 3-87
Figure3-50 OSPF neighbor information ............................................................................................................... 3-87
Figure3-51 Configure IS-IS .................................................................................................................................. 3-89
Figure3-52 IS-IS neighbor .................................................................................................................................... 3-90
Figure3-53 ISIS LSP ............................................................................................................................................ 3-91
Figure3-54 Guard route ........................................................................................................................................ 3-91
Figure3-55 Static route ......................................................................................................................................... 3-92
Figure3-56 Basic routing table ............................................................................................................................. 3-93
Figure3-57 Detailed routing table ......................................................................................................................... 3-94
Figure3-58 RIPng configuration ........................................................................................................................... 3-95
Figure3-59 OSPFv3 configuration ....................................................................................................................... 3-97
Figure3-60 OSPFv3 area configuration ................................................................................................................ 3-97
Figure3-61 OSPFv3 advanced configuration ....................................................................................................... 3-98
Figure3-62 OSPFv3 neighbor information ........................................................................................................... 3-99
Figure3-63 OSPFv3 neighbor information ......................................................................................................... 3-100
Figure3-64 Guard route ...................................................................................................................................... 3-101
Figure3-65 Basic config ..................................................................................................................................... 3-101
Figure3-66 IGMP_Snooping .............................................................................................................................. 3-102
Figure3-67 IGMP snooping proxy...................................................................................................................... 3-103
xiii
Figure3-68 IGMP snooping routing ................................................................................................................... 3-104
Figure3-69 IGMP proxy ..................................................................................................................................... 3-104
Figure3-70 IGMP SSM mapping........................................................................................................................ 3-104
Figure3-71 IGMP Proxy ..................................................................................................................................... 3-105
Figure3-72 IGMP status ..................................................................................................................................... 3-106
Figure3-73 PIM .................................................................................................................................................. 3-107
Figure3-74 Static RP configuration .................................................................................................................... 3-107
Figure3-75 Candidate RP configuration ............................................................................................................. 3-108
Figure3-76 PIM interface configuration ............................................................................................................. 3-108
Figure3-77 Admin scope zone ............................................................................................................................ 3-109
Figure3-78 PIM status ........................................................................................................................................ 3-110
Figure3-79 BSR status ........................................................................................................................................ 3-111
Figure3-80 RP-Mapping ..................................................................................................................................... 3-111
Figure3-81 MSDP............................................................................................................................................... 3-112
Figure3-82 Peer status ........................................................................................................................................ 3-112
Figure3-83 Cache status ..................................................................................................................................... 3-112
Figure3-84 Multicast VPN ................................................................................................................................. 3-113
Figure3-85 Multicast source proxy ..................................................................................................................... 3-113
Figure3-86 Multicast source NAT ...................................................................................................................... 3-113
Figure3-87 Multicast destination NAT ............................................................................................................... 3-114
Figure3-88 Multicast static routing .................................................................................................................... 3-114
Figure3-89 Multicast routing table ..................................................................................................................... 3-114
Figure3-90 PIM multicast routing table.............................................................................................................. 3-115
Figure3-91 IGMP multicast routing table .......................................................................................................... 3-115
Figure3-92 IGMP proxy routing table ................................................................................................................ 3-115
Figure3-93 Basic config ..................................................................................................................................... 3-116
Figure3-94 MLD snooping ................................................................................................................................. 3-117
Figure3-95 MLD................................................................................................................................................. 3-117
Figure3-96 MLD status....................................................................................................................................... 3-117
Figure3-97 PIM .................................................................................................................................................. 3-118
Figure3-98 Admin scope zone ............................................................................................................................ 3-118
Figure3-99 PIM status ........................................................................................................................................ 3-119
Figure3-100 BSR status ...................................................................................................................................... 3-120
Figure3-101 RP-Mapping ................................................................................................................................... 3-120
Figure3-102 PIM multicast routing table............................................................................................................ 3-120
Figure3-103 Policy-based routing ...................................................................................................................... 3-121
Figure3-104 Monitoring ..................................................................................................................................... 3-122
Figure3-105 Policy-based routing ...................................................................................................................... 3-123
Figure3-106 Monitoring ..................................................................................................................................... 3-124
Figure3-107 Global configuration ...................................................................................................................... 3-124
Figure3-108 Static FTN ...................................................................................................................................... 3-124
Figure3-109 Static ILM ...................................................................................................................................... 3-125
Figure3-110 LDP configuration ......................................................................................................................... 3-125
Figure3-111 Display LDP neighbor ................................................................................................................... 3-125
Figure3-112 Display LDP adjacency.................................................................................................................. 3-126
Figure3-113 Display LDP interface.................................................................................................................... 3-126
Figure3-114 L2VPN configuration..................................................................................................................... 3-126
xiv
Figure3-115 SVC mode ...................................................................................................................................... 3-127
Figure3-116 CCC mode...................................................................................................................................... 3-127
Figure3-117 MARTINI mode............................................................................................................................. 3-127
Figure3-118 VPLS mode .................................................................................................................................... 3-127
Figure3-119 Display ARP .................................................................................................................................. 3-128
Figure3-120 Static ARP...................................................................................................................................... 3-128
Figure3-121 Gratuitous ARP .............................................................................................................................. 3-129
Figure3-122 Configure ARP probe period ......................................................................................................... 3-129
Figure3-123 Anti-ARP snooping ........................................................................................................................ 3-130
Figure3-124 ARP configuration ........................................................................................................................ 3-130
Figure3-125 ARP log.......................................................................................................................................... 3-130
Figure3-126 MAC address manage .................................................................................................................... 3-131
Figure3-127 DNS ............................................................................................................................................... 3-131
Figure3-128 DHCP server .................................................................................................................................. 3-132
Figure3-129 DHCPv6 server .............................................................................................................................. 3-134
Figure3-130 DHCP relay agent .......................................................................................................................... 3-134
Figure3-131 DHCP IP address table................................................................................................................... 3-135
Figure3-132 Basic wireless................................................................................................................................. 3-136
Figure3-133 Basic session .................................................................................................................................. 3-137
Figure3-134 Basic session .................................................................................................................................. 3-137
Figure3-135 Basic wireless................................................................................................................................. 3-137
Figure3-136 Ping ................................................................................................................................................ 3-138
Figure3-137 Traceroute ...................................................................................................................................... 3-139
Figure3-138 Capture ........................................................................................................................................... 3-139
Figure3-139 Spanning tree ................................................................................................................................. 3-139
Figure3-140 STP................................................................................................................................................. 3-140
Figure3-141 RSTP .............................................................................................................................................. 3-141
Figure3-142 MSTP ............................................................................................................................................. 3-141
Figure3-143 STP status....................................................................................................................................... 3-142
Figure4-1 Firewall .............................................................................................................................................. 4-144
Figure4-2 Packet filtering policy ........................................................................................................................ 4-144
Figure4-3 Configuring action ............................................................................................................................. 4-146
Figure4-4 Packet filtering policy log .................................................................................................................. 4-147
Figure4-5 IPv6 packet filtering policy ................................................................................................................ 4-148
Figure4-6 IPv6 packet filtering log..................................................................................................................... 4-148
Figure4-7 Source NAT ....................................................................................................................................... 4-149
Figure4-8 Address pool ...................................................................................................................................... 4-149
Figure4-9 Destination NAT ................................................................................................................................ 4-149
Figure4-10 One to one NAT ............................................................................................................................... 4-151
Figure4-11 N to N NAT ..................................................................................................................................... 4-152
Figure4-12 NAT64 prefix ................................................................................................................................... 4-153
Figure4-13 NAT64 address ................................................................................................................................ 4-153
Figure4-14 Address pool .................................................................................................................................... 4-153
Figure4-15 Source NAT ..................................................................................................................................... 4-154
Figure4-16 Destination NAT .............................................................................................................................. 4-154
Figure4-17 Address pool .................................................................................................................................... 4-154
Figure4-18 DS_LITE_NAT................................................................................................................................ 4-155
xv
Figure4-19 Address pool .................................................................................................................................... 4-155
Figure4-20 ALG configuration ........................................................................................................................... 4-156
Figure4-21 User-defined log............................................................................................................................... 4-156
Figure4-22 Basic attack protection ..................................................................................................................... 4-156
Figure4-23 Basic attack log query ...................................................................................................................... 4-158
Figure4-24 Network action manage ................................................................................................................... 4-159
Figure4-25 Sessions Limit .................................................................................................................................. 4-159
Figure4-26 Service Limit .................................................................................................................................... 4-160
Figure4-27 IPv4 blacklist configuration ............................................................................................................. 4-160
Figure4-28 Blacklist query ................................................................................................................................. 4-161
Figure4-29 Black list query ................................................................................................................................ 4-161
Figure4-30 Blacklist log query ........................................................................................................................... 4-162
Figure4-31 MAC/IP Binding .............................................................................................................................. 4-164
Figure4-32 Auto learning ........................................................................................................... 错误!未定义书签。
Figure4-33 User MAC binding ........................................................................................................................... 4-166
Figure4-34 User/IP binding ................................................................................................................................ 4-165
Figure4-35 binding log query ............................................................................................................................. 4-168
Figure4-36 Session Management ....................................................................................................................... 4-169
Figure4-37 Session Parameter ............................................................................................................................ 4-171
Figure4-38 Session Monitoring .......................................................................................................................... 4-171
Figure4-39 Session Monitoring .......................................................................................................................... 4-172
Figure4-40 VIP bandwidth guarantee ......................................................................................... 错误!未定义书签。
Figure4-41 Traffic classification ........................................................................................................................ 4-174
Figure4-42 Congestion avoidance .............................................................................................. 错误!未定义书签。
Figure4-43 Congestion management .................................................................................................................. 4-178
Figure4-44 Traffic shaping ................................................................................................................................. 4-179
Figure4-45 Anti-ARP-Spoofing ......................................................................................................................... 4-179
Figure4-46 ARP configuration ........................................................................................................................... 4-180
Figure5-1 Log management menu ...................................................................................................................... 5-182
Figure5-2 Latest log............................................................................................................................................ 5-182
Figure5-3 System log query................................................................................................................................ 5-183
Figure5-4 System log file operation ................................................................................................................... 5-184
Figure5-5 System log configuration ................................................................................................................... 5-185
Figure5-6 Latest log............................................................................................................................................ 5-186
Figure5-7 Operation log query ........................................................................................................................... 5-187
Figure5-8 Log file operation ............................................................................................................................... 5-188
Figure5-9 Operation log configuration ............................................................................................................... 5-189
Figure5-10 Service log configuration ................................................................................................................. 5-190
Figure6-1 Interface config .................................................................................................................................. 6-193
Figure6-2 Interface config .................................................................................................................................. 6-193
Figure6-3 ISP configuration ............................................................................................................................... 6-195
Figure7-1 Access control menu .......................................................................................................................... 7-196
Figure7-2 Rate limit............................................................................................................................................ 7-196
Figure7-3 User group parameter ......................................................................................................................... 7-197
Figure7-4 Single user limit ................................................................................................................................. 7-198
Figure7-5 Rate limitation .................................................................................................................................... 7-198
Figure7-6 Group management ............................................................................................................................ 7-199
xvi
Figure7-7 Network application browsing ........................................................................................................... 7-200
Figure7-8 Access control .................................................................................................................................... 7-203
Figure7-9 Group management ............................................................................................................................ 7-204
Figure7-10 Network application browsing ......................................................................................................... 7-205
Figure7-11 URL classification filtering .............................................................................................................. 7-207
Figure7-12 Customize URL classification ......................................................................................................... 7-208
Figure7-13 Advanced URL filtering................................................................................................................... 7-209
Figure7-14 Advanced URL filtering configuration ............................................................................................ 7-210
Figure7-15 URL filter page push ........................................................................................................................ 7-211
Figure7-16 URL page push ................................................................................................................................ 7-211
Figure7-17 Advanced URL filtering................................................................................................................... 7-212
Figure7-18 SQL injection prevention ................................................................................................................. 7-214
Figure8-1 IPSec sysConfig ................................................................................................................................. 8-215
Figure8-2 IPsec policy mode .............................................................................................................................. 8-218
Figure8-3 IPsec route mode ................................................................................................................................ 8-218
Figure8-4 Net protect.......................................................................................................................................... 8-219
Figure8-5 SA ...................................................................................................................................................... 8-219
Figure8-6 IPsec interface .................................................................................................................................... 8-219
Figure8-7 L2TP configuration ............................................................................................................................ 8-220
Figure8-8 L2TP user authentication ................................................................................................................... 8-221
Figure8-9 L2TP IP pool ...................................................................................................................................... 8-222
Figure8-10 L2TP online status ........................................................................................................................... 8-222
Figure8-11 PPTP ................................................................................................................................................ 8-222
Figure8-12 GRE configuration ........................................................................................................................... 8-224
Figure8-13 SMAD .............................................................................................................................................. 8-225
Figure8-14 SMAD blacklist ............................................................................................................................... 8-225
Figure8-15 SMAD log ........................................................................................................................................ 8-225
Figure8-16 SSL VPN.......................................................................................................................................... 8-226
Figure8-17 IP pool configuration ....................................................................................................................... 8-227
Figure8-18 Domain configuration ...................................................................................................................... 8-227
Figure8-19 License management ........................................................................................................................ 8-227
Figure8-20 Portals management ......................................................................................................................... 8-228
Figure8-21 Resource configuration .................................................................................................................... 8-228
Figure8-22 Share space....................................................................................................................................... 8-228
Figure8-23 User configuration ........................................................................................................................... 8-229
Figure8-24 User status ........................................................................................................................................ 8-229
Figure8-25 Authentication key ........................................................................................................................... 8-229
Figure8-26 Security set ....................................................................................................................................... 8-230
Figure8-27 Security rule ..................................................................................................................................... 8-230
Figure8-28 Security rule group ........................................................................................................................... 8-230
Figure8-29 Policy configuration ......................................................................................................................... 8-231
Figure8-30 Log query ......................................................................................................................................... 8-231
Figure8-31 Log configuration............................................................................................................................. 8-231
Figure8-32 Log manage...................................................................................................................................... 8-231
Figure8-33 User stat form................................................................................................................................... 8-232
Figure8-34 Flux stat form ................................................................................................................................... 8-232
Figure8-35 Statistical offline users ..................................................................................................................... 8-232
xvii
Figure8-36 Online time ranking form................................................................................................................. 8-233
Figure8-37 Resource access form ....................................................................................................................... 8-233
Figure9-1 Traffic analysis................................................................................................................................... 9-234
Figure9-2 Traffic analysis................................................................................................................................... 9-234
Figure9-3 Policy configuration ........................................................................................................................... 9-235
Figure9-4 Advanced configuration ..................................................................................................................... 9-236
Figure9-5 Keyword filtering ............................................................................................................................... 9-237
Figure9-6 Keyword filtering ............................................................................................................................... 9-238
Figure10-1 Security center ............................................................................................................................... 10-239
Figure10-2 Basic authentication configuration items ....................................................................................... 10-239
Figure10-3 Webauth configuration................................................................................................................... 10-241
Figure10-4 TAC configuration ......................................................................................................................... 10-242
Figure10-5 Customer configuration ................................................................................................................. 10-243
Figure10-6 Web authentication notice.............................................................................................................. 10-243
Figure10-7 Web listen ...................................................................................................................................... 10-244
Figure10-8 Proscenium management ............................................................................................................... 10-244
Figure10-9 Online management for the hotel user. .......................................................................................... 10-245
Figure10-10 Terminal management ................................................................................................................. 10-246
Figure10-11 USB data leakage monitor ........................................................................................................... 10-247
Figure10-12 Terminal configuration ................................................................................................................ 10-247
Figure10-13 Online user ................................................................................................................................... 10-248
Figure10-14 Local Account Authentication ..................................................................................................... 10-249
Figure10-15 Blackname list .............................................................................................................................. 10-250
Figure10-16 Remote synchronization............................................................................................................... 10-251
Figure11-1 Display IDS cooperation log .......................................................................................................... 11-252
Figure12-1 High availability............................................................................................................................. 12-253
Figure12-2 VRRP configuration....................................................................................................................... 12-254
Figure12-3 Monitoring ..................................................................................................................................... 12-255
Figure12-4 Monitoring ..................................................................................................................................... 12-256
Figure12-5 BFD option..................................................................................................................................... 12-256
Figure12-6 Overflow protect ............................................................................................................................ 12-257
Figure12-7 Hot standby .................................................................................................................................... 12-257
Figure12-8 Handwork synchronization ............................................................................................................ 12-258
Figure12-9 Backup reboot ................................................................................................................................ 12-258
Figure12-10 Interface synchronization group................................................................................................... 12-259
xviii
List of Tables
Table2-1 Device information ................................................................................................................................ 2-10
Table2-2 Device status ......................................................................................................................................... 2-11
Table2-3 System threshold ................................................................................................................................... 2-13
Table2-4 SNMPv3 configuration ......................................................................................................................... 2-17
Table2-5 User management .................................................................................................................................. 2-21
Table2-6 Current administrator ............................................................................................................................ 2-22
Table2-7 Administrator settings configuration items ........................................................................................... 2-22
Table2-8 Administrator authentication setting ..................................................................................................... 2-24
Table2-9 Login parameter settings ....................................................................................................................... 2-26
Table2-10 Authority management configuration items ........................................................................................ 2-27
Table2-11 WEB access protocol .......................................................................................................................... 2-28
Table2-12 Interface service .................................................................................................................................. 2-29
Table2-13 Remote user ......................................................................................................................................... 2-30
Table2-14 Configuration file configuration items ................................................................................................ 2-31
Table2-15 Version information ............................................................................................................................ 2-34
Table2-16 The auto-upgrade settings ................................................................................................................... 2-34
Table2-17 Manual upgrade configuration items ................................................................................................... 2-35
Table2-18 Version information ............................................................................................................................ 2-37
Table2-19 The auto-upgrade settings ................................................................................................................... 2-38
Table2-20 Manual upgrade configuration items ................................................................................................... 2-38
Table2-21 Software version configuration items .................................................................................................. 2-41
Table2-22 NTP server mode configuration items ................................................................................................. 2-42
Table2-23 NTP client mode.................................................................................................................................. 2-43
Table2-24 Virtual server setting configuration items ........................................................................................... 2-44
Table2-25 VRF configuration items ..................................................................................................................... 2-45
Table2-26 Device information configuration items .............................................................................................. 2-47
Table2-27 CA Server configuration items ............................................................................................................ 2-48
Table2-28 CRL server configuration .................................................................................................................... 2-49
Table2-29 Certification Management ................................................................................................................... 2-51
Table2-30 CRL management ................................................................................................................................ 2-52
Table3-1 Security zone configuration items ......................................................................................................... 3-63
Table3-2 IP address object configuration items.................................................................................................... 3-65
Table3-3 IP address object group ......................................................................................................................... 3-66
Table3-4 IP address object group ......................................................................................................................... 3-67
Table3-5 Account user.......................................................................................................................................... 3-68
Table3-6 State ....................................................................................................................................................... 3-72
Table3-7 Configure static route ............................................................................................................................ 3-74
Table3-8 Basic routing table................................................................................................................................. 3-76
Table3-9 Detailed routing table configuration items ............................................................................................ 3-77
Table3-10 BGP neighbor configuration ............................................................................................................... 3-78
Table3-11 BGP advanced configuration............................................................................................................... 3-79
Table3-12 BGP advanced configuration............................................................................................................... 3-80
Table3-13 BGP-VPN configuration items ............................................................................................................ 3-80
i
Table3-14 BGP-VPN configuration items ............................................................................................................ 3-81
Table3-15 RIP interface configuration ................................................................................................................. 3-83
Table3-16 RIP advanced configuration ................................................................................................................ 3-83
Table3-17 OSPF advanced configuration ............................................................................................................. 3-85
Table3-18 OSPF area configuration ..................................................................................................................... 3-85
Table3-19 OSPF interface configuration .............................................................................................................. 3-86
Table3-20 OSPF interface information................................................................................................................. 3-87
Table3-21 OSPF neighbor information ................................................................................................................ 3-88
Table3-22 IS-IS advanced configuration .............................................................................................................. 3-89
Table3-23 IS-IS interface configuration ............................................................................................................... 3-89
Table3-24 IS-IS neighbor ..................................................................................................................................... 3-90
Table3-25 ISIS LSP .............................................................................................................................................. 3-91
Table3-26 Basic routing table ............................................................................................................................... 3-93
Table3-27 Detailed routing table .......................................................................................................................... 3-94
Table3-28 RIPNG interface configuration ........................................................................................................... 3-95
Table3-29 RIPng advanced configuration ............................................................................................................ 3-96
Table3-30 OSPFv3 area configuration ................................................................................................................. 3-97
Table3-31 OSPFv3 interface configuration .......................................................................................................... 3-98
Table3-32 OSPFv3 advanced configuration ......................................................................................................... 3-99
Table3-33 OSPFv3 interface information............................................................................................................. 3-99
Table3-34 OSPFv3 neighbor information .......................................................................................................... 3-100
Table3-35 Basic config ....................................................................................................................................... 3-102
Table3-36 IGMP snooping ................................................................................................................................. 3-102
Table3-37 IGMP configuration .......................................................................................................................... 3-103
Table3-38 IGMP Proxy ...................................................................................................................................... 3-105
Table3-39 IGMP status ....................................................................................................................................... 3-106
Table3-40 Candidate BSR configuration ............................................................................................................ 3-107
Table3-41 Static RP configuration ..................................................................................................................... 3-107
Table3-42 Candidate RP configuration .............................................................................................................. 3-108
Table3-43 Interface configuration ...................................................................................................................... 3-108
Table3-44 Global zone configuration ................................................................................................................. 3-109
Table3-45 Global zone configuration ................................................................................................................. 3-110
Table3-46 Basic config ....................................................................................................................................... 3-116
Table3-47 Global zone configuration ................................................................................................................. 3-118
Table3-48 Global zone configuration ................................................................................................................. 3-119
Table3-49 Policy-based routing configuration items .......................................................................................... 3-122
Table3-50 Policy-based routing configuration items .......................................................................................... 3-123
Table3-51 Dynamic DHCP server configuration ............................................................................................... 3-132
Table3-52 Static DHCP server configuration ..................................................................................................... 3-133
Table3-53 DHCP relay configuration ................................................................................................................. 3-134
Table3-54 DHCP IP address table ...................................................................................................................... 3-135
Table3-55 BFD configuration............................................................................................................................. 3-136
Table3-56 Select STP configuration items ......................................................................................................... 3-140
Table3-57 MSTP region configuration items ..................................................................................................... 3-141
Table4-1 Packet filtering policy configuration items ......................................................................................... 4-145
Table4-2 Configuring action............................................................................................................................... 4-146
Table4-3 Destination NAT configuration ........................................................................................................... 4-149
ii
Table4-4 One to one NAT configuration ............................................................................................................ 4-151
Table4-5 Address pool configuration ................................................................................................................. 4-152
Table4-6 Basic attack protection ........................................................................................................................ 4-157
Table4-7 Basic attack log query ......................................................................................................................... 4-158
Table4-8 Blacklist configuration ........................................................................................................................ 4-160
Table4-9 Blacklist query..................................................................................................................................... 4-161
Table4-10 Blacklist log query ............................................................................................................................ 4-162
Table4-11 MAC/IP binding ................................................................................................................................ 4-164
Table4-12 Switches table.................................................................................................................................... 4-165
Table4-13 Auto learning ..................................................................................................................................... 4-163
Table4-14 User/Mac binding .............................................................................................................................. 4-167
Table4-15 User /IP binding ................................................................................................................................ 4-165
Table4-16 binding log query .............................................................................................................................. 4-168
Table4-17 VIP bandwidth guarantee .......................................................................................... 错误!未定义书签。
Table4-18 Congestion avoidance ............................................................................................... 错误!未定义书签。
Table4-19 Congestion management ................................................................................................................... 4-178
Table4-20 Anti-ARP-Spoofing ........................................................................................................................... 4-180
Table4-21 ARP configuration............................................................................................................................. 4-180
Table5-1 Latest log ............................................................................................................................................. 5-182
Table5-2 System log querying condition ............................................................................................................ 5-184
Table5-3 System log file operation..................................................................................................................... 5-185
Table5-4 System log configuration..................................................................................................................... 5-185
Table5-5 Latest log ............................................................................................................................................. 5-186
Table5-6 Operation log query ............................................................................................................................. 5-188
Table5-7 Back up or delete operation file .......................................................................................................... 5-189
Table5-8 Operation log configuration ................................................................................................................ 5-189
Table5-9 Service log configuration .................................................................................................................... 5-190
Table7-1 Rate limit configuration items ............................................................................................................. 7-196
Table7-2 User group parameter .......................................................................................................................... 7-197
Table7-3 Single user limit .................................................................................................................................. 7-198
Table7-4 Single user rate limit ........................................................................................................................... 7-199
Table7-5 Access control configuration items ..................................................................................................... 7-203
Table7-6 URL classification filtering configuration items ................................................................................. 7-207
Table7-7 Customize URL classification ............................................................................................................. 7-208
Table7-8 Advanced URL filtering configuration items ...................................................................................... 7-209
Table7-9 URL filter parameter configuration items ........................................................................................... 7-210
Table7-10 SQL injection protection configuration items ................................................................................... 7-214
Table8-1 IPSec VPN configuration .................................................................................................................... 8-215
Table8-2 IPSec VPN client access mode and gateway-gateway mode .............................................................. 8-216
Table8-3 LNS configuration items ..................................................................................................................... 8-220
Table8-4 LNS configuration items ..................................................................................................................... 8-220
Table8-5 PNS configuration ............................................................................................................................... 8-223
Table8-6 Customer information ......................................................................................................................... 8-223
Table8-7 GRE configuration items ..................................................................................................................... 8-224
Table8-8 SSL VPN configuration items ............................................................................................................. 8-226
Table9-1 Traffic statistic configuration items .................................................................................................... 9-235
Table9-2 Policy configuration ............................................................................................................................ 9-235
iii
Table9-3 Keyword filtering configuration items ................................................................................................ 9-237
Table9-4 Keyword filtering configuration items ................................................................................................ 9-238
Table10-1 Basic authentication configuration items ........................................................................................ 10-240
Table10-2 Webauth configuration items .......................................................................................................... 10-241
Table10-3 TAC configuration items ................................................................................................................. 10-242
Table10-4 Customer configuration ................................................................................................................... 10-243
Table10-5 Web listen configuration items........................................................................................................ 10-244
Table10-6 Proscenium management ................................................................................................................. 10-245
Table10-7 Hotel user online management ........................................................................................................ 10-245
Table10-8 Microsoft patch management .......................................................................................................... 10-246
Table10-9 USB data leakage monitor ............................................................................................................... 10-247
Table10-10 Terminal configuration items ........................................................................................................ 10-248
Table10-11 Online user .................................................................................................................................... 10-248
Table10-12 Local account authentication ......................................................................................................... 10-249
Table10-13 Local account authentication configuration items ......................................................................... 10-251
Table11-1 Display IDS integration log configuration items............................................................................. 11-252
Table12-1 VRRP configuration items .............................................................................................................. 12-254
Table12-2 Monitor IP address object configuration items ............................................................................... 12-256
Table12-3 Hot standby details of the hot standby ............................................................................................ 12-258
Table12-4 Interface synchronization group ...................................................................................................... 12-259
iv
DPtech FW1000 Series Firewall Products User Configuration Guide
With information technology change and network information system development, the application level of
government and enterprise are expanding from traditional small to critical large scale business system. Information
security is a dynamic process, providing itself with high-efficient network operation platform but also potentially
threaten the network by complicated IT business system and different background users. Therefore, firewall can
effectively prevent and protect service flow and sensitive information transmission from inside network to the
Internet, understanding network system security status timely and accurately, which can detect the against security
policy violation events, report logs and alarm in the real time.
DPtech FW1000 Series are next-generation products designed for enterprise, telecom and industry users,
providing users with all kinds of solutions under various network environments. DPtech FW1000 Firewall
combines packet filtering function with VPN security protection; integrate OSPFv3, RIP routing into source NAT
and destination NAT translation, which separate and restrict network communication from Intranet and Internet and
other outside network to separate, and restrict network communication so that the inner network devices can be
protected.
FW1000 firewall not only satisfied with inner network security protection under all kinds of network
environments, but also has powerful application layer features such as flow control, analysis, webpage filtering,
which helps enterprise administrators understand and grasp network safety status in time, and discovers unsafe
factors (such as visit violation, misuse resource, packet attack and divulge secret. etc.); Continuous and periodical
signature database update allow enterprises to get the newest signature database in shortest time, which guarantee
the most safety inner network.
! Caution:
It is recommended that you should use IE 6.0 or higher. The resolution should be 1024 x 768 or higher.
<Backward>, <Forward> and <Refresh> are not supported on the Web management interface. If you use these
buttons, the Web page may not be displayed properly.
By default, the name of the management port is meth0_0, and the IP address is 192.168.0.1.
Both of the default username and the default password are admin. You can use the default username for the first
login, but it is strongly recommended that you should change your password. For how to change your password, see
the Section “xxxx”.
After you log in, if you don’t perform any operations within 5 minutes, the connection will timeout and go back to
the login page.
Up to 5 administrators are allowed to log in to the Web management interface at the same time.
Figure1-2 shows the main page of the Web Management Interface of the FW device.
1-6
DPtech FW1000 Series Firewall Products User Configuration Guide
Navigation bar: Lists all of the Web management function menus. You can choose the desired function menu,
which is shown in the configuration area.
Shortcut area: Shows the directory of the current page, as well as the status of the device. This area also
provides function buttons, including Collapse, Homepage, Restart, Help and Logout.
Configuration area: Provides an area for configuring and viewing the device.
1-7
DPtech FW1000 Series Firewall Products User Configuration Guide
System management allows user to configure the related system management function, including:
Device management
SNMP configuration
RMON configuration
Administrator
Configuration file
Signature database
Software version
NTP configuration
Virtual system
VRF
Digital certificate
Installation package
Centralized management
To access system menu, you can select Basic > System from navigation tree, as shown in Figure2-1.
2-8
DPtech FW1000 Series Firewall Products User Configuration Guide
Device information feature helps user to know the information about current system and the device, including
system name, system time and system time zone, memory, external memory, serial number, PCB hardware version,
software version, default management interface information, CPLD hardware version, Conboot version and power.
To enter the device information page, you can choose Basic > System management > Device management >
Device information from navigation tree, as shown in Figure2-2.
2-9
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
External memory size Displays the type of the external memory and capacity.
Default management interface information Displays the name of the default management interface and default IP address.
Note:
When you login to the FW WEB management interface, the first page you will seen is the Device Information page.
Device status module displays the system current health status, which helps user to understand CPU, memory, disk
and CF card utilization, fan and power supply status, CPU and mainboard temperature.
2-10
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the device status page, you can choose Basic > System management > Device management > Device
status from navigation tree, as shown in Figure2-3.
Item Description
CPU utilization Displays real-time CPU utilization. When it beyond the threshold, the indicator light displays
red light . Otherwise, the indicator light displays green light .
Memory utilization Displays real-time memory utilization. When it beyond the threshold, the indicator light
displays red light . Otherwise, the indicator light displays green light .
Hardware utilization Displays real-time hardware utilization. When it beyond the threshold, the indicator light
displays red light . Otherwise, the indicator light displays green light .
CF Card utilization Displays real-time CF Card utilization. When it beyond the threshold, the indicator light
displays red light . Otherwise, the indicator light displays green light .
Fans status Displays real-time fans status. When one of the fans can’t work normally, the indicator light
displays red light . Otherwise, the indicator light displays green light .
Power status Displays real-time power status. When the power can’t work normally, the indicator light
displays red light . Otherwise, the indicator light displays green light .
CPU temperature Displays real-time CPU temperature. When it beyond the threshold, the indicator light displays
red light . Otherwise, the indicator light displays green light .
Mainboard temperature Displays real-time mainboard temperature. When it beyond the threshold, the indicator light
displays red light . Otherwise, the indicator light displays green light .
Note:
Hover your mouse pointer over an LED, you can view the real-time data. On the webpage, you can view the
real-time information about CPU, memory utilization, fan and power supply status.
2-11
DPtech FW1000 Series Firewall Products User Configuration Guide
Device information settings provide a function of modifying the system name and time. Users can modify the
system threshold according to their requirement and select whether to enable the remote diagnostic function.
To enter the device information settings page, you can choose Basic > System management > Device
management > Device setting > Device information settings from navigation tree, as shown in Figure2-4.
The system name feature allows users to customize system name, which is easily to be managed.
To enter the information settings page and configure the system name, you can choose Basic > System
management > Device management > Information settings, as shown in Figure2-5.
Select Device Information Setting tab and type in the system name
After you click Ok button, new settings take effect immediately.
System time allows user to customize the system time, synchronizing with the current time.
2-12
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the system time interface, you can choose Basic > System management > Device management >
Information settings from navigation tree, as shown in Figure2-6.
To modify the system time, you can take the following steps:
Select Device Information Settings tab, and reconfigure time zone, date and time.
After you click Ok button, new settings take effect immediately.
System threshold allow user to configure the hardware utilization and temperature threshold.
To enter the device information settings and configure system threshold, you can choose Basic > System
management >Device management > Information settings from navigation tree, as shown in Figure2-7.
Item Description
CPU temperature threshold Set the lower limit and upper limit of the CPU temperature threshold.
2-13
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Mainboard temperature threshold Set the lower limit and upper limit of the mainboard temperature threshold.
To configure system thresholds of the device, you can take the following steps:
Enable remote diagnostic allows users to do non-local operations for the device, which effectively solve the network
failure.
To enter the device information settings page and enable the remote diagnostics function, you can choose Basic >
System management >Device management > Information settings from navigation tree, as shown in Figure2-8.
The set frame gap allows user to set the frame gap of data frames.
To enter the device information settings page and set frame gap, you can choose Basic > System
management >Device management > Information settings from navigation tree, as shown in Figure2-9.
! Caution:
Please configure the system threshold according to hardware specification and processing capacity. If there is no
special requirement, you should adopt default settings. When hardware utilization, CPU and mainboard
temperature beyond thresholds, the hardware LED on Device Status page will turn red from green. Please contact
network administrator to solve the problem.
System parameter is mainly set the fast forwarding parameter setting, blacklist taking effect immediately setting,
packet filtering taking effect immediately setting, and Ac Memory Spec Set setting.
2-14
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the system parameter setting page, you can choose Basic > System management >Device management >
System parameter settings, as shown in Figure2-10.
Clear database function provides the function of clearing the database configuration. Clear the database and then the
device will be rebooted.
To enter the clear database page, you can choose Basic > System management >Device management > System
parameter settings, as shown in Figure2-11.
Simple Network Management Protocol (SNMP) is a frame that use TCP/IP protocol suite to manage the devices on
the Internet, providing a suite of basic operation to monitor and maintain Internet.
2-15
DPtech FW1000 Series Firewall Products User Configuration Guide
2.3.1.1 SNMP
Simple Network Management Protocol (SNMP) is the communication rule used for the management device and
managed device in the network. It defines a series of information, method and grammar and used for the
management device access and manage to the managed device.
To enter SNMP version configuration page, you can choose Basic > System management > SNMP configuration
from navigation tree, as shown in Figure2-12.
Figure2-12 SNMP
To configure the SNMP version configuration, you can take the following steps:
Select Basic > System management > SNMP configuration from navigation tree to enter the SNMP version
page.
Click the SNMPv1, SNMPv2c or SNMPv3 checkbox.
Select SNMPv1, SNMPv2c option, you should configure the read community string or the read/write
community string.
Click Ok button in the upper right corner on the webpage.
2-16
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Authenticate protocol Determining that the message is from a valid source. You should select an authenticate
protocol, including none, MD5 and SHA.
Encryption algorithm Mixing the contents of a package to prevent it from being read by an unauthorized source.
You should select a kind of encryption algorithm, including none, DES.
Operation
Click copy or delete to do the operations.
To enter the device information page and configure the device information, you can choose Basic > System
management > SNMP configuration from navigation tree, as shown in Figure2-13.
To configure the device information, you can take the following steps:
2-17
DPtech FW1000 Series Firewall Products User Configuration Guide
Select Basic > System management > SNMP configuration from navigation tree to enter the SNMP version
interface.
Configure the device information, including device location, contact information, trap destination host.
Click Ok button in the upper right corner on the webpage.
To enter the NAT traverse page and configure NAT traverse, you can choose Basic > System management >
SNMP configuration from navigation tree, as shown in Figure2-14.
Select Basic > System management > SNMP configuration from navigation tree to enter the SNMP version
interface.
Configure the primary channel configuration and command channel configuration.
Click Ok button in the upper right corner on the webpage.
The administrator who has added into the IP address list can access to device.
To enter the device information page and configure IP address list, you can choose Basic > System management >
SNMP configuration from navigation tree, as shown in Figure2-15.
2-18
DPtech FW1000 Series Firewall Products User Configuration Guide
Remote Monitoring (RMON) defined by Internet Engineering Task Force (IETF), which is a kind of Management
Information Base (MIB), reinforcement of the MIB II standard. RMON is mainly used to monitor one network
segment or the whole network traffic, which is the widely used network management standard at present.
2.4.1 Alarm
2.4.1.1 Alarm
The RMON alarm group monitors specified alarm variables, such as statistics on a port. If the sampled value of the
monitored variable is bigger than or equal to the upper threshold, an upper event is triggered; if the sampled value of
the monitored variable is lower than or equal to the lower threshold, a lower event is triggered. The event is then
handled as defined in the event group.
To enter the RMON alarm page, you can choose Basic > System management > RMON from navigation tree, as
shown in Figure2-16.
Figure2-16 Alarm
2.4.1.2 Alarm_stat
To enter the alarm_stat device information page and configure IP address list, you can choose Basic > System
management > Alarm_stat from navigation tree, as shown in Figure2-17.
Figure2-17 Alarm_stat
2-19
DPtech FW1000 Series Firewall Products User Configuration Guide
2.4.2 History
2.4.2.1 History
The history group periodically collects statistics on data at interfaces and saves the statistics in the history record
table for query convenience. The statistics data includes bandwidth utilization, number of error packets, and total
number of packets.
Once you successfully create a history entry in the specified interface, the history group starts to periodically collect
statistics on packet at the specified interface. Each statistical value is a cumulative sum of packets sent/received on
the interface during a sampling period.
To enter the RMON alarm page, you can choose Basic > System management > RMON from navigation tree, as
shown in Figure2-18.
Figure2-18 History
2.4.2.2 History_stat
To enter the alarm_stat device information page and configure IP address list, you can choose Basic > System
management > History_stat from navigation tree, as shown in Figure2-19.
Figure2-19 History_stat
To enter the RMON log page, you can choose Basic > System management > RMON log, as shown in Figure2-20.
2-20
DPtech FW1000 Series Firewall Products User Configuration Guide
2.5 Administrator
Item Description
Current administrator List all administrators who has logged into the web management interface, which can kick out other
administrator.
Administrator settings Allows you to add, delete and modify an administrator’s password and administrator’ authority and
to modify the administrator except the administrator itself.
Administrator authentication Allows you to configure the login authentication parameter, it includes local authentication and
settings Radius authentication and Tacacs Plus authentication.
Logon parameter Allows you to configure the logon parameter, it includes the time out settings, login lock settings,
configuration unlock time.
Current administrator allows you to view the administrators who has logged into the web management interface.
To enter the current administrator interface, you can choose Basic > System management > Administrator >
Administrator from navigation tree, as shown in Figure2-21.
2-21
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Administrator Displays the name of the administrator who has logged into the web management interface.
Logon time Displays the specific time of the administrator who has logged on the device.
Last access time Displays the last time when an administrator log in to the web management interface.
Logon IP address Displays the IP address of the administrator who has logged into the web management interface.
Operation
Click the kick out icon that an administrator can be kicked out.
Item Description
Confirm password The password and confirm password must be same. If not, the system will prompt you that the two
passwords are inconsistent when you submit them.
2-22
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Consists of alphanumeric characters, case sensitive, and allows using space and special character. The
length of the description is from 0 to 40 characters.
Status Allows you to select a status for the administrator, including lock or normal.
Lock: means the administrator who has been locked that cannot log in to the web management
interface.
Normal: means the administrator who isn’t locked that can login into web management interface.
Operation
Click delete icon that the administrator can be deleted.
Enter the administrator page, you choose Basic > Administrator > Administrator from navigation tree.
In each column, you type in the password, confirm password and description.
Select the privilege for the administrator.
Click Ok button in the upper right corner on the webpage.
2-23
DPtech FW1000 Series Firewall Products User Configuration Guide
! Caution:
Default password cannot be used when you add an administrator, please confiure the password corresponding to the
rule.
You cannot lock administrator when you add the administrator. Default status is normal. If you require to lock the
administrator, you should lock the administrator after you create it.
When you delete an administrator, the system will prompt you. Please carefully use it.
The administrator authentication setting page allows user to configure the authentication method of an administrator
to login to the webpage, including local authentication and Radius authentication.
To enter the administrator authentication setting page, you can choose Basic > System management >
Administrator from navigation tree from navigation tree, as shown in Figure2-23.
Item Description
Local authentication To authenticate administrator’s name and password through the device.
2-24
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Radius authentication To authenticate administrator’s name and password through Radius server, please configure the
following parameters:
Server IP address
Authentication port number
Shared key
Authentication packet timeout time
Authentication packet retransmission times
Radius authentication user to which user group belongs
Tacacs Plus authentication To authenticate administrator’s name and password through Tacacs Plus server. Please configure the
following parameters:
Server IP address
Share key
LDAP authentication To authenticate administrator’s name and password through Tacacs Plus server. Please configure the
following parameters:
LDAP server version
LDAP server address
LDAP server port
Username attribute name
Base DN
Administrator DN
Administrator Password
You can set several security parameters to login to web, including time out settings, login lock settings, and unlock
time and login password strength settings.
To enter the login parameter settings page, you can choose Basic > System management > Administrator from
navigation tree, as shown in Figure2-24.
2-25
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Idle timeout Set the idle timeout for the current administrator.
If an administrator did not perform any operations in that time, the administrator will
be quit by the system forcedly.
Login lock settings If you type in error password for the administrator for consecutive times, the
administrator will be locked.
Unlock time Set the time that the administrator has been locked.
Lock: means the specific time that you have designated for the
administrator to be locked. When the time is arrived, this administrator can be unlocked
automatically.
Permanent: If an administrator has been locked, this administrator
unable to unlock by itself. Only if an administrator with system permission configuration can
modify the locked administrator status in the “Administrator setting” column.
Password strength settings Allows you to select the password strength, including high, medium and low.
The group to which a Allows you to select a configuration to which a remote authentication user belongs,
remote authentication includes:
user belongs Super
System configuration
Business configuration
Log configuration
Manage center configuration
Remote authentication Configure remote authentication user right. The range is from 1 to 5, 1 is the highest
user rights level.
2-26
DPtech FW1000 Series Firewall Products User Configuration Guide
! Caution:
If an user has been locked, whether you enter correct password or not, the system will prompt you that the user has
been locked, please try it again later !
User can login to the web management page according to different privileges, and also user can login to the web
management page as their requirements.
To enter the authority management page, you can choose Basic > System management > Administrator >
authority from navigation tree, as shown in Figure2-25.
Item Description
Super The administrator has the permission to login to the Web, which can configure all modules.
System configuration The administrator has the permission to login to the Web, which can configure system management
module and network management module, without the permission except system configuration.
Business configuration The administrator has the permission to login to the Web, which can configure the firewall module,
load balancing module, access control module, VPN module, behavior analysis module, user
authentication module and comprehensive module, without the permission except business
management.
Log management configure The administrator has the permission to login to the Web, which can view service log, system log,
range operation log and comprehensive log, without the permission except log management.
User customize configure The administrator has the permission to login to the Web and allow user to customize the
range configuration range.
2-27
DPtech FW1000 Series Firewall Products User Configuration Guide
On the web access protocol interface, you can configure web access protocol and port.
To enter the WEB access protocol interface, you can choose Basic > System management > Administrator >
WEB access protocol from navigation tree, as shown in Figure2-26.
Item Description
HTTP settings Click Enable HTTP checkbox and configure the port number.
HTTPS settings Click Enable HTTPS checkbox and configure the port number.
If digit certificate is configured, you can enable the administrator certificate authentication function
to enhance security function.
Connection number Configure the connection number. The range is from 5-200, default is 100.
Limited interface service module limits the login access protocol for all service interfaces, including https, http,
telnet, SSH, ping protocol.
2-28
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the limited interface service page, you can choose Basic > System management > Administrator >
Interface service limit from navigation tree, as shown in Figure2-27.
Item Description
Limit services Allows you to select which kind of access protocol to be limited, including Https, Http telnet, SSH,
Ping protocol.
Operation
Click copy button or delete button to do the operations.
Set the remote user login method, and set the maximum remote user login number.
To enter the remote user page, you can choose Basic > System management > Administrator > Interface service
limit from navigation tree, as shown in Figure2-28.
2-29
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Client IP Displays the IP address that the client used to login to the web.
Login type Displays the client login type, including telnet and SSH method.
Last operation time Displays the last time that the user did operation.
Operation
Click kick out button to quit the administrator forcedly.
! Caution:
User can enable the Telent and SSH method at the same time, but only login method can be used to login to the
device.
Configuration file provides the function of saving current system configuration to your local system. Through this
function, you can configure one of the devices if there are many devices in the network with same configurations
and export configuration file to your local system and then from other devices to import the configuration file.
To enter the configuration file page, you can choose Basic > System management > Administrator >
Configuration file from navigation tree, as shown in Figure2-29.
2-30
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Last save Displays the last time when configuration file saved.
Software version Displays the software version of the configuration file which you saved the last
time.
Operation Allows you to save, export, switch, or deleted configuration file by clicking such
icons: the save icon, the export icon, the switch icon and the delete
icon.
You only can switch the factory default configuration file.
To create a new configuration file, you can take the following steps:
Click the New config button in the upper left corner on the webpage.
Configure the file name in the new line of the configuration file list, and click the Save icon.
To import a configuration file and apply it, you can take the following steps:
2-31
DPtech FW1000 Series Firewall Products User Configuration Guide
Click Browse button which beside the file path, and select a configuration file to be downloaded, and click
Download button
The downloaded configuration file displays in the configuration file list. Click the switch icon to switch
configuration file.
A pop-up a window hit you that ‘switch the configuration, after that, the device will restart, will you continue?’
Click the Ok button.
To upload your configuration file to a server, you can take the following steps:
Select TFTP or FTP protocol which will be used if you upload your configuration file to the server
Configure server address to upload your configuration file, such as 10.58.241.234/test
On the server, you should run the software 3CDaemon and create a new file folder, such as test
Click Upload button beside the file name
Select TFTP or FTP protocol which will be used if you download a configuration file from the server
Configure the server address to download the configuration file, such as 10.58.241.234/test
On the server, you should run the software 3CDaemon and select a software version to be downloaded.
Click Download beside the file path
To save configuration file on your device at regular time, you should take the following steps:
Enable the Time save device configuration option
Select unit settings
Select time settings
Note:
Please refer to the above steps if you want to save , export or delete configuration file.
Hot patching is a kind of fast and low cost method to repair the software defect. Compare with updating software
version, the main advantage of hot patching is the running services of the device will not be disconnected, that is,
you don’t need to reboot your device that the current software of the device can be repaired.
2-32
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the patch page, you can choose Basic > System management > Administrator > Patch from navigation
tree, as shown in Figure2-29.
APP signature module displays APP signature version information and allows user to upgrade APP signature
database automatically or manually.
To enter the APP signature page, you can choose Basic > System management > Signature > APP Signature
from navigation tree, as shown in Figure2-31.
2-33
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Current version Displays the release date, signature version and update time of the current APP
signature.
History version Displays the release date, signature version of the version which you have updated
last time.
Valid period Displays when you can update the signature database.
Downgrade Click the downgrade button that you can downgrade the APP signature database to
the previous version.
To downgrade a signature database version, you can take the following steps:
Click Downgrade button in the upper right corner, the system prompt you that signature database will be
downgraded to a history version, continue?
Click Confirm button
After you downgrade the signature database version, current signature version become history version
Auto-upgrade settings help user to get the newest signature database from official website in every specific time,
real time updating signature database.
To enter the auto-upgrade settings interface, you can choose Basic > System management > Signature > APP
signature from navigation tree, as shown in Figure2-33.
Item Description
2-34
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Click the check box of the enable auto-upgrade, and then the configuration can be
used.
Manual upgrade allows you to upgrade signature database when you need it. And user can export specific signature
database file from your local system and manual upgrade the signature database.
To enter the manual upgrade interface, you can choose Basic > System management > Signature > APP
Signature from navigation tree, as shown in Figure2-34.
Item Description
File path Select signature database upgrade packet file path and select which upgrade packet
should be downloaded.
Note:
During signature database upgrade process, the interface will skip to the upgrade process interface.
URL classification filtering signature module displays URL classification filtering signature version information
and allows user to upgrade URL classification filtering signature database automatically or manually.
To enter the URL classification filtering signature page, you can choose Basic > System management >
Signature > URL classification filtering from navigation tree, as shown in Figure2-36.
Version information is used to display version information of URL classification filtering signature database.
To enter the version information page, you can choose Basic > System management > Signature > URL
classification filtering signature from navigation tree, as showing in Figure2-37.
2-36
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Current version Displays the release date, signature version and update time of the current URL
classification filtering signature.
History version Displays the release date, signature version of the version which you have updated
last time.
Valid period Displays when you can update the signature database.
Downgrade Click the downgrade button that you can downgrade the URL classification filtering
signature database to the previous version.
To downgrade a signature database version, you can take the following steps:
Click Downgrade button in the upper right corner, the system prompt you that signature database will be
downgraded to a history version, continue?
Click Confirm button
After you downgrade the signature database version, current signature version become history version
Auto-upgrade settings help user to get the newest signature database from official website in every specific time,
real time updating signature database.
To enter the auto-upgrade settings page, you can choose Basic > System management > Signature > URL
classification filtering signature from navigation tree, as shown in Figure2-38.
2-37
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Manual upgrade allows you to upgrade signature database when you need it. And user can export specific signature
database file from your local system and manual upgrade the signature database.
To enter the manual upgrade interface, you can choose Basic > System management > Signature > URL
classification filtering signature from navigation tree, as shown in Figure2-39.
Item Description
File path Select signature database upgrade packet file path and select which upgrade packet
should be downloaded.
2-38
DPtech FW1000 Series Firewall Products User Configuration Guide
Note :
During signature database upgrade process, the interface will skip to the upgrade process interface.
2.8.3 AV signature
To enter AV signature page, you can choose Basic > System Management > Signature database > License
management from navigation tree, as shown in Figure2-43.
Figure2-41 AV signature
To enter IPS signature page, you can choose Basic > System Management > Signature database > IPS signature
from navigation tree, as shown in Figure2-42.
2-39
DPtech FW1000 Series Firewall Products User Configuration Guide
License management module is the license registered page that allows you to import and export license file.
To enter license management page, you can choose Basic > System Management > Signature database >
License management from navigation tree, as shown in Figure2-43.
Click the Export File button and then system prompt you a windows.
And then select a file path for the license file and then click the Save button.
Click the Browse button and then select a file path for the license file.
And then select a license file to download.
After you finish the above steps, click the Import File button.
2-40
DPtech FW1000 Series Firewall Products User Configuration Guide
Software version provides the function of managing and upgrading device software version.
To enter the software version interface, you can choose Basic > System Management > Software Version from
navigation tree, as shown in Figure2-44.
’
Table2-21 describes the configuration items of the software version.
Item Description
Current status Displays the status of software version, including in use and others.
Operation Click save or delete icon to do the operations. In-use software version can’t
be deleted.
The software for the next boot Select a software version for the next boot, which will be run when you reboot your
device.
To download a software version file and apply it, you can take the following steps:
Click Browse button and select a software version to download, then click Download button.
On the software version page, displayed the downloaded software version, move your mouse pointer to the
software version for the next boot, and then mouse pointer become pencil icon.
Click the drop down list and select a software version.
After you finished the above steps, click Ok button.
2-41
DPtech FW1000 Series Firewall Products User Configuration Guide
2.10 NTP
NTP is intended for the clock synchronization of all devices in the network, keeping time consistent for all devices,
so that the devices can provide multiple applications based on time synchronization.
To enter the NTP page, you can choose Basic > System Management > NTP from navigation tree, as shown in
Figure2-45.
Item Description
Master-slave server Select whether the NTP server is a master NTP server.
Operation
To copy or delete NTP configuration, you can click the copy icon and the
delete icon.
2-42
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
NTP server address Configures NTP server address and select whether to enable authentication.
2-43
DPtech FW1000 Series Firewall Products User Configuration Guide
Virtual management system is a new system generated by the existing operation system. Meanwhile it also has the
same function with original system that can be switched to the original system flexibly.
To enter the virtual management system page, you can choose Basic > System Management > Virtual System
from navigation tree, as shown in Figure2-47.
To enter the virtual management system parameter settings page, you can choose Basic > System Management >
Virtual management system parameter settings from navigation tree, as shown in Figure2-48.
Item Description
2-44
DPtech FW1000 Series Firewall Products User Configuration Guide
2.12 OVC
To enter the OVC configuration page, you can choose Basic > System Management > OVC from navigation tree,
as shown in Figure2-48.
2.13 VRF
VPN Routing and Forwarding (VRF) is a technology used in computer networks that allows multiple instances of a
routing table to co-exist within the same router at the same time. Because the routing instances are independent, the
same or overlapping IP addresses can be used without conflicting with each other.
To enter the virtual system page, you can choose Basic > System management > VRF from navigation tree, as
shown in Figure2-50.
Item Description
2-45
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Interface Select one interface or several interfaces for each virtual interface.
Operation
Click the copy icon that you can copy an entry of the VRF configuration.
Click the delete icon that you can delete an entry of the VRF configuration.
A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other
transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number,
expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures),
and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.
To enter the digital certificate configuration page, you can choose Basic > System management > Digital
certification > Certification configuration from navigation tree, as shown in Figure2-51.
Device information configuration provides the function of configuring basic information of digital certificate.
2-46
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the device information configuration page, you can choose Basic > System management > Digital
certification > Certification configuration from navigation tree, as shown in Figure2-52.
Item Description
To configure the device information configuration, you can take the following steps:
2-47
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
CA ID Configure the CA ID
To configure the CA server configuration, you can take the following steps:
Configure CA ID
Configure certificate application URL
Select a method of how to apply for a certificate
And then configure the certificate query number and configure the certificate query time interval
After you finish the above steps, click Ok button in the upper right corner on the webpage.
2-48
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Obtain CRL URL Set the URL for manual configuring the CRL.
To configure the CRL server, you can take the following steps:
Certificate management is used in obtaining the key of a certificate, applying certificate, and managing certificate
and CRL.
To enter to the certification management interface, you can choose Basic > System management > Digital
certification > Certification management from navigation tree, as shown in Figure2-55.
2-49
DPtech FW1000 Series Firewall Products User Configuration Guide
Key management is used to generate new key of the certificate and allows you to view or hide key information.
To enter to the key management page, you can choose the Basic > System management > Digital certificate >
Certificate management from navigation tree, as shown in Figure2-56.
Note:
Factory default for the certificate key is that the device does not have certificate key.
Click the Hide key information button that you can view or hide RSA publick key information.
Certificate application can be used to generate certificate application information and allows you to submit
certificate application online or offline.
To enter the certification management interface and view the certificate application, you can choose the Basic >
System management > Digital certification > Certificate management from navigation tree, as shown in
Figure2-57.
2-50
DPtech FW1000 Series Firewall Products User Configuration Guide
Certificate management module provides two methods to obtain certificate, including import certificate offline and
the obtain certificate online.
To view certificate management, you can choose Basic> System management > Digital certification >
Certification application from navigation tree, as shown in Figure2-58.
Item Description
Certificate subject/Identification name(DN) Displays the certificate subject or identification name (DN).
Click the browse icon that you can view the detailed information of the
certificate.
Click the delete icon that you can delete a certificate file.
2-51
DPtech FW1000 Series Firewall Products User Configuration Guide
CRL management provides these functions: offline import CRL function, start/stop CRL query, and export CRL
files, and allows you to manage CRL, such as view the detailed information of a CRL and delete the CRL.
To enter the certificate management interface and view the CRL management, you can choose Basic > System
management > Digital certification > Certificate application from navigation tree, as shown in Figure2-59.
Item Description
Current CRL update date Displays the update date time of current CRL.
Next CRL update date Displays the next update date time of CRL.
Click the browse icon that you can view the detailed information of the
CRL.
To enter the installation package interface, you can choose Basic > System management > Installation Package
from navigation tree, as shown in Figure2-60.
2-52
DPtech FW1000 Series Firewall Products User Configuration Guide
Centralized management is a method of the firewall using an interface to manage several firewalls in the network.
As simple as you using a remote control to manage all electrical appliances in your home, the centralized
management can greatly simplify administrator’s work.
To enter the centralized management page, you can choose Basic > System management > Management center
from navigation tree, as shown in Figure2-61.
3-53
DPtech FW1000 Series Firewall Products User Configuration Guide
Network management provides the related function about device network management:
Interface management
3G Dial-up
Network object
Forwarding
IPv6_Tunnel
IPv6 autoconfig
IPv4 unicast routing
IPv4 multicast routing
IPv6 multicast routing
Policy-based routing
ICMP
MPLS
ARP
DNS
DHCP
BFD
Wireless
Diagnostic tool
Lan switch
To access network management menu, you can choose Basic > Network, as shown in Figure3-1.
3-54
DPtech FW1000 Series Firewall Products User Configuration Guide
Interface management provides function of configuring network mode, such as networking configuration, VLAN
configuration, interface configuration, port aggregation, and logic interface configuration.
User can configure the FW device’s interface working mode according to their requirement for the network mode
and select the interface type. If you select Layer 2 interface, you should configure a VLAN ID for the Layer 2
interface. If you select Layer 3 interface, you should configure an IP address for the Layer 3 interface.
To enter the networking configuration page, you can choose Basic> Network > Interface management >
Networking configuration from navigation tree, as shown in Figure3-2.
3-55
DPtech FW1000 Series Firewall Products User Configuration Guide
VLAN configuration provides the function of configuring VLAN ID and applying the VLAN ID to Layer 2 network
mode interface for users.
To enter the VLAN interface configuration page, you can choose Basic> Network > Interface management >
VLAN interface configuration from navigation tree, as shown in Figure3-3.
To enter the VLAN frame manage page, you can choose Basic> Network > VLAN configuration > VLAN frame
manage from navigation tree, as shown in Figure3-4.
3-56
DPtech FW1000 Series Firewall Products User Configuration Guide
Service interface configuration allows user to view and modify the interface status of the device.
To enter the interface configuration page, you can choose Basic> Network > Interface management > Interface
configuration, as shown in Figure3-5.
To enter the interface rate beyond warning page, you can choose Basic> Network > Interface management >
Interface rate beyond warning, as shown in Figure3-6.
3-57
DPtech FW1000 Series Firewall Products User Configuration Guide
Port aggregation binds multiple links together to form a logical channel, so that it can increase link bandwidth. In the
meanwhile, those bound together links can dynamically backup with each other which enhance the link reliability.
To enter the port aggregation configuration page, you can choose Basic> Network > Interface management >
Port aggregation, as shown in Figure3-7.
To enter the aggregation group status page, you can choose Basic> Network > Interface management > Port
aggregation status, as shown in Figure3-8.
3-58
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the local mirroring page, you can choose Basic> Network > Interface management > Local mirroring,
as shown in Figure3-9.
To enter the local mirroring page, you can choose Basic> Network > Interface management > Remote source
mirroring from navigation tree, as shown in Figure3-10.
To enter the remote destination mirroring page, you can choose Basic> Network > Interface management >
Remote destination mirroring from navigation tree, as shown in Figure3-11.
Logic interface is to divide one physical interface into several logical interfaces, so that it can realizes sub interfaces
data switching. Logic interface configuration includes sub interface, Loopback interface, and PPP interface
configuration.
3-59
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the sub interface configuration page, you can choose Basic> Network > Interface management > Logic
interface > Sub interface, as shown in Figure3-12.
To enter the loopback interface configuration page, you can choose Basic> Network > Interface management >
Logic interface > Loopback interface, as shown in Figure3-13.
To enter the PPP interface configuration page, you can choose Basic> Network > Interface management > Logic
interface > PPP interface from navigation tree, as shown in Figure3-14.
To enter the template interface page, you can choose Basic> Network > Interface management > Logic
interface > Template interface from navigation tree, as shown in Figure3-15.
3-60
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IPsec interface page, you can choose Basic> Network > Interface management > Logic interface >
IPsec interface from navigation tree, as shown in Figure3-16.
3.2.7 GRE
To enter the GRE page, you can choose Basic> Network > Interface management > GRE from navigation tree, as
shown in Figure3-17.
Figure3-17 GRE
3.3 3G Dial-up
3G dial-up allows you to dial-up the Internet by using of 3G. User can select a network operator for 3G dial-up, and
user can select whether to enable the reconnect after disconnection function according to requirement and add
default route.
To enter the 3G Dial-up page, you can choose Basic> Network > 3G dial-up from navigation tree, as shown in
Figure3-18.
Figure3-18 3G dial-up
3-61
DPtech FW1000 Series Firewall Products User Configuration Guide
Traditional firewall policies are configured based on packet inbound and outbound interfaces on early
dual-homed firewalls. With the development of firewalls, they can not only connect the internal and external
network, but also connect the internal network, external network, and the Demilitarized Zone (DMZ). Also, they are
providing high-density ports. A high-end firewall can provide dozens of physical interfaces to connect multiple
logical subnets. In this networking environment, traditional interface-based policy configuration mode requires
configuration of a security policy for each interface, which brings great working loads for administrators and thus
increases probability for introducing security problems due to improper configurations.
The industry-leading firewalls solve the above problems by implementing security policies based on security zones.
A security zone is an abstract conception. It can include physical interfaces and logical interfaces, and also Trunk
interface + VLAN. Interfaces added to the same security zone have consistent security needs. Therefore, an
administrator can classify interfaces (assign them to different zones) based on their security needs, thus
implementing hierarchical policy management. For example, on the firewall in the following figure, the
administrator can add the interface that connects the R&D area to Zone_RND, and the interface connecting the
servers to Zone_DMZ. In this way, the administrator only needs to deploy security policies in the two zones. If the
network changes in the future, the administrator only needs to adjust the interfaces in a certain zone, without
modifying the security policies. The security zone management feature not only simplifies policy maintenance but
also separates network services from security services.
To enter the security zone page, you can choose Basic> Network > Network object > Security zone from
navigation tree, as shown in Figure3-19.
3-62
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Serial number Allows you to view the serial number of the security zone.
Zone name Allows you to specify a name for the security zone.
Priority Allows you to specify the priority for the security zone.
Description Allows you to specify the description for the security zone.
Operation
Click copy icon or delete icon to do the operations.
1. Network requirement
2. A company uses Device as the network border firewall device to connect the internal network and the Internet and
to provide WWW and FTP services to the external network. You need to perform some basic configurations for the
zones of the firewall to prepare for the configurations of the security policies. The internal network is a trust network
and can access the server and the external network. You can deploy the internal network in the Trust zone with a
higher priority and connect the interface eth0/0 on Device to the external network. The external network is an
3-63
DPtech FW1000 Series Firewall Products User Configuration Guide
untrusted network, and you need to use strict security rules to control access from the external network to the
internal network and the server. You can deploy the external network in the Untrust zone with a lower priority and
connect the interface gige 0_0 on Device to the external network.
If you deploy the WWW server and the FTP server on the external network, security cannot be ensured; if you
deploy them on the internal network, the external illegal users may use the security holes to attack the internal
network. Therefore, you can deploy the servers in the DMZ zone with a priority between Trust and Untrust, and
connect the Ethernet interface eth0/1 on Device to the servers. In this way, the server in the DMZ zone can access
the external network in the Untrust zone with a lower priority, but when it accesses the internal network in the
Trustzone with a higher priority, its access is controlled by the security rules.
3. Configuration procedure:
By default, the system has created the Trust, DMZ and Untrust zones, defined the priority of these zones.
(1) Deploy the Trustzone.
Select Basic> Network > Network object > Security zone from navigation tree to enter the security zone interface,
then select the interface eth0_0 for the trust zone, and then click Ok button.
(2) Deploy the DMZ zone.
Select Basic> Network > Network object > Security zone from navigation tree to enter the security zone interface,
then select the interface eth0_1 for the DMZ, and then click Ok button.
(3)Untrust zone
Select Basic> Network > Network object > Security zone from navigation tree to enter the security zone interface,
then select the interface eth0_7 for the Untrust zone, and then click Ok button.
3.4.2 IP address
IP address function provides user with address object, address object group function for users. Those functions can
divide the inner network addresses into several groups and apply these addresses to the expanded application, so that
the inner network user can be managed effectively.
To enter the IP address object page, you can choose Basic> Network > Network object > IP address > IP address
object from navigation tree, as shown in Figure3-21.
3-64
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Content Allows you to specify a name Displays the IP range of the IP address object and
exceptional IP address.
Operation
Click copy icon or delete icon to do the operations.
To enter the IP address object group page, you can choose Basic> Network > Network object > IP address > IP
address object group from navigation tree, as shown in Figure3-22.
3-65
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Policy reference Displays which policy can be referenced to the IP address object group.
Operation
Click copy icon or delete icon to do the operations.
To enter the IPv6 address page, you can choose Basic> Network > Network object > IPv6 address from
navigation tree, as shown in Figure3-23.
To enter the MAC address page, you can choose Basic> Network > Network object > MAC address from
navigation tree, as shown in Figure3-24.
3-66
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the MAC address group page, you can choose Basic> Network > Network object > MAC address group
from navigation tree, as shown in Figure3-25.
Item Description
Mac address Displays the user group created in the MAC address.
Mac address group Create the MAC address group, and add the MAC address to the MAC address
group.
To enter the MAC address manage page, you can choose Basic> Network > Network object > MAC address
manage from navigation tree, as shown in Figure3-26.
3-67
DPtech FW1000 Series Firewall Products User Configuration Guide
3.4.6 Account
A user, which is added into the account list can access to the Internet.
To enter the account user page, you can choose Basic> Network > Network object > Account > Account user
from navigation tree, as shown in Figure3-27.
Item Description
3-68
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click copy or delete icon to do operations.
The domain name function provides the domain name and IP address translation function for users, which allows
users to view the IP address after domain name is configured.
To enter the domain name page, you can choose Basic> Network > Network object > Domain name from
navigation tree, as shown in Figure3-28.
3.4.8 Service
The service function definite the type and character of the protocol carried by IP (Such as TCP or UDP source port/
destination port, ICMP protocol information type/information code), which can be referenced to the policy as packet
matching condition.
To enter the predefined service object page, you can choose Basic> Network > Network object > Service>
Predefine service object from navigation tree, as shown in Figure3-29.
3-69
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the user-defined service object, you can choose Basic> Network > Network object > Service >
User-defined service object from navigation tree, as shown in Figure3-30.
To enter the service object group page, you can choose Basic> Network > Network object > Service > Service
object group from navigation tree, as shown in Figure3-31.
3.5 Forwarding
3.5.1 Forwarding
To enter the forwarding page, you can choose Basic> Network > Network object > Forwarding > Forwarding
from navigation tree, as shown in Figure3-32.
3-70
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-32 Forwarding
To enter the forwarding mode page, you can choose Basic> Network > Network object > Forwarding >
Forwarding mode from navigation tree, as shown in Figure3-33.
To enter the neighbor discover page, you can choose Basic> Network > Network object > Forwarding >
Neighbor discover from navigation tree, as shown in Figure3-34.
3-71
DPtech FW1000 Series Firewall Products User Configuration Guide
3.6 Trans_Tech
3.6.1 DS_LITE
To enter the DS_Lite page, you can choose Basic> Network > Trans_Tech > DS_Lite from navigation tree, as
shown in Figure3-35.
Figure3-35 DS_Lite
To enter the 6to4 tunnel page, you can choose Basic> Network > 6 to4 tunnel from navigation tree, as shown in
Figure3-37.
Table3-6 State
Item Description
Tunnel source interface IP Select whether to use the tunnel source address or the tunnel source interface to
configure
Operation
Click icon or delete to do the operations.
3-72
DPtech FW1000 Series Firewall Products User Configuration Guide
3.8 Autoconfig
To enter the stateless configuration page, you can choose Basic> Network > Stateless configuration, as shown in
Figure3-37.
IPv4 unicast routing allows you to configure IPv4 static routing manually. After you configured IPv4 static routing,
data packets will be transmitted to the destination according to your requirement.
Static route is a kind of special route that configured by administrator manually. After static route is configured, data
packets go to the specific destination will be forwarded to the paths designated by administrator.
In a simple network, network communication can be realized only by configure the static route. If you set and use
static route properly, it can improve the network performance and guarantee bandwidth for important applications.
When you configure static route, you should understand the following:
1. Destination IP address and mask
When you configure static route, destination IP address and mask must be in dotted decimal notation format.
3-73
DPtech FW1000 Series Firewall Products User Configuration Guide
In actual, all route entries have their explicit next hop addresses. When data packet are sent, their destination address
will be looked up in the routing table and find out which route can be matched. Only if you specify the next hop, link
layer find the corresponding layer address and forward data packet.
3. Priority
You can specify different priorities for different static routes, so that you can flexibly use the route management
policy. Such as: configuring multiple routes to the same destination, if you specify the routes with same priority, it
can realize load sharing, if you specify different the routes with different priority, then route back up can be realized.
To enter the configure static route page, you can choose Basic> Network > IPv4 unicast routing > Configure
static route from navigation tree, as shown in Figure3-38.
Item Description
Batch configure static route Allows you to import static routes in batch.
Describe Allows you to configure the description for the static route.
Operation
Click copy icon or delete icon to do the operations.
3-74
DPtech FW1000 Series Firewall Products User Configuration Guide
3.9.2.2 Monitoring
To enter the health check page, you can choose Basic> Network > IPv4 unicast routing > Health check from
navigation tree, as shown in Figure3-39.
Basic routing table page provides user with the basic routing table query function. User can select the all routes,
designated destination network segment or designated destination IP radio box to look up routing table, as shown in
Figure3-40.
To enter the configure static route page, you can choose Basic> Network > IPv4 unicast routing > Basic routing
table from navigation tree, as shown in Figure3-40.
3-75
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Destination network segment Allows you to view the destination network segment
Gateway (Next hop) Allows you to view the network gateway (Next hop) address.
Outbound interface Allows you to view the static route outbound interface.
Detailed routing table page provides user with the detailed routing table query function. User can select the all
routes, designated destination network segment, designated protocol, or designated destination IP radio box to look
up routing table.
To enter the detailed routing table page, you can choose Basic> Network > IPv4 unicast routing > Detailed
routing table, as shown in Figure3-41.
3-76
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Subnet mask Allows you to view the subnet mask of the destination IP address.
Gateway (Next hop) Allows you to view the gateway (next hop) IP address.
Outbound interface Allows you to view the interface on which IP packets are forwarded.
Protocol Allows you to view the method that the route is generated, including
Static, Connect, RIP, OSPF, BGP, Guard protocol.
Equal-cost route (ECMP) is that in order to go to the same destination IP address or destination segment, multiple
route paths with the same Cost value are existed. If device supports equal-cost route, Layer 3 traffic forwarded to the
destination IP or destination segment can realize load sharing through different paths, so that the network load
balancing can be realized. If failure occurs in some paths, these paths will be replaced by others which realize route
redundancy backup function.
3-77
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the equal-cost route page, you can choose Basic> Network > IPv4 unicast routing > Equal-cost route
load balancing from navigation tree, as shown in Figure3-42.
3.10.4 BGP
Border Gateway Protocol (BGP) is a kind of dynamic routing protocol used for autonomous systems (AS).
Autonomous systems have the same routing policy, running at a series of routes under the same technology
management department.
There are three early BGP versions, BGP-1 (RFC1105), BGP-2 (RFC1163) and BGP-3 (RFC1267). The current
version in use is BGP-4 (RFC 4271), which is the defacto Internet exterior gateway protocol used between ISPs.
To enter the configure BGP page, you can choose Basic> Network > IPv4 unicast routing > BGP from navigation
tree, as shown in Figure3-43.
Item Description
3-78
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Authentication information Allows you to select a method of BGP authentication, include none and MD5.
Operation
Click copy, delete or insert icon that you can do the operations.
To configure the BGP neighbor configuration, you should take the following steps:
Click the checkbox of enable BGP, enter the local AS number
Configure the neighbor configuration
Click Ok button in the upper right corner on the webpage.
Item Description
To configure BGP advanced configuration, you should take the following steps:
Click advanced configuration.
Configure the router ID.
Select which kind of route will be introduced.
Click Ok button in the upper right corner.
3-79
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Destination network segment Configure destination network segment for route aggregation.
Operation
Click icon, delete icon, insert icon to do the operations.
To enter the configure BGP-VPN neighbor information page, you can choose Basic> Network > IPv4 unicast
routing > Configure BGP-VPN from navigation tree, as shown in Figure3-44.
Item Description
Select Basic> System > Virtual system from navigation tree to enter the virtual system interface, and click the
enable virtual system configuration.
Select Basic> System > VRF from navigation tree to enter the VRF interface, and create a new VRF, such as
VRF_A, select a virtual system and an interface for the VRF.
Select Basic> Network > IPv4 unicast routing > BGP from navigation tree to enter the VRF interface, and
create a new VRF, such as VRF_A, select a virtual system and an interface for the VRF
Enable the MPLS and LDP function, and configure the BGP-VPN function, example: select VRF_A, configure
the RD 1:100, RT import: 1:200, RT export: 1:300, and select which kind of route redistributed to the BGP
route.
Firewall device B:
Select Basic> System > Virtual system from navigation tree to enter the virtual system interface, and click the
enable virtual system configuration.
Select Basic> System > VRF from navigation tree to enter the VRF interface, and create a new VRF, such as
VRF_A, select a virtual system and an interface for the VRF.
Select Basic> Network > IPv4 unicast routing > BGP from navigation tree to enter the VRF interface, and
create a new VRF, such as VRF_A, select a virtual system and an interface for the VRF
Enable the MPLS and LDP function, and configure the BGP-VPN function, example: select VRF_A, configure
the RD 1:100, RT import: 1:300, RT export: 1:200, and select which kind of route redistributed to the BGP
route.
To enter the configure BGP neighbor information page, you can choose Basic> Network > IPv4 unicast routing >
BGP Neighbor Information from navigation tree, as shown in Figure3-45.
Item Description
3-81
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
3.10.5 RIP
The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a
routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the
source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits
the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate
inaccessible, inoperable, or otherwise undesirable routes in the selection process.
To enter the RIP page, you can choose Basic> Network > IPv4 unicast routing > RIP from navigation tree, as
shown in Figure3-46.
3-82
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Enabling status Allows you to enable or disable an interface that run RIP protocol.
Item Description
Router update timer Allows you to configure the time intervals for router update timer.
Router aging timer Allows you to configure the router aging timer.
Redistribute route Allows you to set the RIP protocol introduced route.
To enter the RIP page, you can choose Basic> Network > IPv4 unicast routing > RIP from navigation, as shown
in Figure3-47.
3-83
DPtech FW1000 Series Firewall Products User Configuration Guide
3.10.6 OSPF
Open Shortest Path First (OSPF) is a link state interior gateway protocol developed by the OSPF working group of
the Internet Engineering Task Force (IETF).
OSPF has the following features:
Wide scope: Supports networks of various sizes and up to several hundred routers in an OSPF routing domain.
Fast convergence: Transmits updates instantly after network topology changes for routing information
synchronization in the AS.
Loop-free: Computes routes with the shortest path first (SPF) algorithm according to collected link states, so no
route loops are generated.
Area partition: Allows an AS to be split into different areas for ease of management and routing information
transmitted between areas is summarized to reduce network bandwidth consumption.
Equal-cost multi-route: Supports multiple equal-cost routes to a destination.
Routing hierarchy: Supports a four-level routing hierarchy that prioritizes routes into intra-area, inter-area,
external Type-1, and external Type-2 routes.
Authentication: Supports interface-based packet authentication to ensure the security of packet exchange.
Multicast: Supports multicasting protocol packets on some types of links.
3.10.6.1 OSPF
To enter the OSPF page, you can choose Basic> Network > IPv4 unicast routing > OSPF from navigation tree, as
shown in Figure3-48.
3-84
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
To configure OSPF advanced configuration, you should take the following steps:
Item Description
Operation
Click copy icon or delete icon to do the operations.
Item Description
Hello interval Allow you to configure the Hello packet time interval (Default is 10 second).
Dead interval Allows you to configure the Dead time interval that the interface doesn’t receive
Hello packet (Default is 40 second).
Note:
After you enable OSPF, the OSPF function and OSPF advance configuration can be used.
To enter the OSPF interface information, you can choose Basic> Network > IPv4 unicast routing > OSPF
interface information from navigation tree, as shown in Figure3-49.
3-86
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
To enter the OSPF interface information page, you can choose Basic> Network > IPv4 unicast routing > OSPF
interface information from navigation tree, as shown in Figure3-50.
3-87
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Dead Time Displays the Dead time that the device establish relationship with neighbors.
Established time Displays the time that the device establish relationship with neighbors.
3.10.7 IS-IS
To enter the configure IS-IS page, you can choose Basic> Network > IPv4 unicast routing > IS-IS from
navigation tree, as shown in Figure3-51.
3-88
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Item Description
NET type Allows you to configure the NET type, including broadcast and P2P.
To configure the IS-IS advanced configuration, you should take the following steps:
To enter the configure IS-IS neighbor information page, you can choose Basic> Network > IPv4 unicast routing >
IS-IS from navigation tree, as shown in Figure3-52.
Item Description
To enter the IS-IS LSP page, you can choose Basic> Network > IPv4 unicast routing > IS-IS LSP from
navigation tree, as shown in Figure3-53.
3-90
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click to view the detailed information.
The Guard route should be used with BGP. BGP protocol imports guard route to the BGP route table and advertises
it to BGP peer, so that the traffic forwarded to other devices by BGP peer will be introduced to Guard device, then
Guard device filter and clear the traffic.
To enter the guard route page, you can choose Basic> Network > IPv4 unicast routing > Guard from navigation
tree, as shown in Figure3-54.
3-91
DPtech FW1000 Series Firewall Products User Configuration Guide
IPv6 unicast routing allows user to configure IPv6 static routing manually. After you configured IPv6 static routing,
data packets will be transmitted to the desired destination.
To enter the static route page, you can choose Basic> Network > IPv6 unicast routing > Static route from
navigation tree, as shown in Figure3-55.
To configure static route in batch, you should take the following steps:
Click Browse button to select a configuration file from local disk.
Click Ok button and then static route configuration file is imported immediately.
Click Export button to export all static routes.
Basic routing table provides users with the function of querying detailed routing information. User can click all
routes or specify the destination subnet radio box to query the basic routing table.
3-92
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the basic routing table page, you can choose Basic> Network > IPv6 unicast routing > Basic routing
table from navigation tree, as shown in Figure3-56.
Item Description
Subnet mask Allows you to view the destination subnet IP address and subnet mask.
Gateway (Next hop) Allows you to view the gateway (Next hop) address.
Outbound interface Allows you to view the outbound interface of the route.
Detailed routing table provides users with the function of querying detailed routing information. Users can click all
routes or specify the destination subnet, specify a protocol to query radio box to query the detailed routing table.
To enter the detailed routing table page, you can choose Basic> Network > IPv6 unicast routing > Detailed
routing table from navigation tree, as shown in Figure3-57.
3-93
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Subnet mask Allows you to view the subnet mask of the destination IP address.
Gateway (Next hop) Allows you to view the gateway (next hop) IP address.
Outbound interface Allows you to view the interface on which IP packets are forwarded.
Protocol Allows you to view the method that the route is generated, including
Static, Connect, RIP, OSPF, BGP, Guard protocol.
3.11.2 RIPng
RIPng is also called the next generation RIP protocol, which derives from RIP-2 protocol in IPv4 network. Most
RIP conception can be used for RIPng protocol. RIPng uses hop count to measure the distance to the destination
(also is called metric or cost). In RIPng, hop 0 can be counted from one router to the directly connected network, hop
1 can be counted from one router to the directly connected router to other network, and the rest can be done in the
same manner. When the hop count is larger than or equal to 16, destination network or host is unreachable.
3-94
DPtech FW1000 Series Firewall Products User Configuration Guide
3.11.2.1 RIPng
To enter the RIPng page, you can choose Basic> Network > IPv6 unicast routing > RIPng from navigation tree,
as shown in Figure3-58.
Item Description
Enabling status Specify whether to enable RIP protocol for the interface.
Advanced configuration Specify the interface RIP working mode and horizontal split.
3-95
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Garbage recycle timer Specify the deleted time interval of out routing table.
Note:
RIPng and its advanced configuration can be used after enable RIPng function.
3.11.3 OSPFv3
To enter the OSPFv3 page, you can click Basic > Network > OSPFv3 from navigation tree, as shown in
Figure3-59.
3-96
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click delete icon, and then you can delete an area.
3-97
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Hello time interval Specify the hello packet time interval for an interface.
Dead time interval Displays the dead time interval of an unreceived interface.
Advanced configuration Specify interface OSPFv3 protocol and all its advanced configuration.
Note:
To configure OSPFv3 configuration, you must add interface into OSPFv3 protocol.
3-98
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
To access the OSPFv3 interface information, you can click Basic > Network > Unicast IPv6 routing > OSPFv3 >
OSPFv3 neighbor information as shown in Figure3-62.
Item Description
3-99
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
DR Displays DR of an area
To access the OSPFv3 interface information, you can click Basic >Basic > Network > IPv6 unicast routing >
OSPFv3 neighbor information, as shown in Figure3-63.
Item Description
DR Displays DR of an area.
3-100
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the guard route page, you can choose Basic> Network > IPv4 unicast routing > Guard, as shown in
Figure3-54.
The multicast technique effectively addresses the issue of point-to-multipoint data transmission. By allowing
high-efficiency point-to-multipoint data transmission over an IP network, multicast greatly saves network
bandwidth and reduces network load.
To enter basic config page, you can choose Basic> Network > IPv6 multicast routing > Basic config from
navigation tree, as shown in Figure3-65.
3-101
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Multicast border Allows you to configure multicast address and subnet mask.
Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mechanism that runs
on Layer 2 devices to manage and control multicast groups.
To enter IGMP_snooping page, you can choose Basic> Network > IPv6 multicast routing > IGMP_Snooping
interface from navigation tree, as shown in Figure3-66.
Figure3-66 IGMP_Snooping
Item Description
Dynamic learning Allows you to select whether to enable the dynamic learning function.
3-102
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Quick leave Allows you to select whether to enable the quick leave function.
With quick leave processing function enabled, when the device receives an IGMP
leave message on a port, the device directly removes that port from the forwarding
table entry for the specific group. If only one host is attached to the port, enable fast
leave processing to improve bandwidth management.
Static configuration: MAC address/Member Displays static configuration: MAC group address/Member port
port
To enter the IGMP page, you can choose Basic> Network > IPv4 multicast routing > IGMP snooping proxy, as
shown in Figure3-67.
Item Description
Timer query interval Allows you to set the timer query interval.
Max response time Allows you to set the max response time.
Group num Allows you to set the IGMP multicast group number.
3-103
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IGMP snooping routing page, you can choose Basic> Network > IPv4 multicast routing > IGMP
proxy from navigation tree, as shown in Figure3-44.
3.12.3.1 IGMP
To enter the IGMP page, you can choose Basic> Network > IPv4 multicast routing > IGMP/IGMP Proxy >
IGMP from navigation tree, as shown in Figure3-69.
To enter the IGMP SSM mapping page, you can choose Basic> Network > IPv4 multicast routing >
IGMP/IGMP Proxy > IGMP SSM Mapping from navigation tree, as shown in Figure3-70.
3-104
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IGMP proxy page, you can choose Basic> Network > IPv4 multicast routing > IGMP/IGMP
Proxy > IGMP proxy from navigation tree, as shown in Figure3-71.
Item Description
Host interface configuration Select whether to enable IGMP proxy on the host interface.
Route interface configuration Select whether to enable IGMP proxy on each interface.
To configure IGMP proxy configuration, you should take the following steps.
Note:
After you enable the IGMP Proxy function, IGMP Proxy can be used.
To enter the IGMP status interface, you can choose Basic> Network > IPv4 multicast routing > IGMP status
from navigation tree, as shown in Figure3-72.
3-105
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
3.12.4 PIM
3.12.4.1 PIM
Protocol Independent Multicast (PIM) provides IP multicast forwarding by leveraging static routes or unicast
routing tables generated by any unicast routing protocol, such as Routing Information Protocol (RIP), Open Shortest
Path First (OSPF), Intermediate System To Intermediate System (IS-IS), or Border Gateway Protocol (BGP).
Independent of the unicast routing protocols running on the device, multicast routing can be implemented as long as
the corresponding multicast routing entries are created through unicast routes.
To enter the PIM page, you can choose Basic> Network > IPv4 multicast routing > PIM > PIM from navigation
tree, as shown in Figure3-73.
3-106
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-73 PIM
Item Description
Candidate BSR enable status Select the enabling status of BSR, including enable and disable.
Candidate BSR hash mask length Configure the candidate BSR hash mask length.
To configure static RP configuration, you can choose Basic> Network > IPv4 multicast routing > PIM > Static
RP configuration from navigation tree, as shown in Figure3-74
Item Description
Static RP enabling status Select the enabling status of static RP configuration, including enable and disable.
3-107
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
To configure candidate RP configuration, you can choose Basic> Network > IPv4 multicast routing > PIM >
Candidate RP configuration from navigation tree, as shown in Figure3-75.
Item Description
To configure the PIM interface configuration, you can choose Basic> Network > IPv4 multicast routing > PIM
from navigation tree, as shown in Figure3-76.
Item Description
Enabling status Select the enabling status of interface configuration, including enable and disable.
3-108
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Hello interval Select the Hello interval which counts in unit of second.
BSR border Select the enabling status of BSR border, including enable and disable.
To enter the admin scope zone page, you can choose Basic> Network > IPv4 multicast routing > PIM > Admin
scope zone, as shown in Figure3-77.
Item Description
To configure Global zone configuration, you can take the following steps:
3-109
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click insert or delete icon to do the operations.
To configure global zone configuration, you should take the following steps:
Note:
After you enable the global zone configuration, global zone configuration can be used.
To enter the PIM status page, you can choose Basic> Network > IPv4 multicast routing > PIM > PIM status, as
shown in Figure3-78.
To enter the BSR status page, you can choose Basic> Network > IPv4 multicast routing > PIM > BSR status, as
shown in Figure3-79.
3-110
DPtech FW1000 Series Firewall Products User Configuration Guide
3.12.4.5 RP-Mapping
To enter the RP-Mapping page, you can choose Basic> Network > IPv4 multicast routing > PIM > RP-Mapping
from navigation tree, as shown in Figure3-80.
Figure3-80 RP-Mapping
3.12.5 MSDP
Multicast Source Discovery Protocol (MSDP) establishes MSDP peer relationships among RPs of different
PIM-SM domains, source active (SA) messages can be forwarded among domains and the multicast source
information can be shared.
3.12.5.1 MSDP
To enter MSDP page, you can choose Basic> Network > IPv4 multicast routing > MSDP from navigation tree, as
shown in Figure3-81.
3-111
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-81 MSDP
To enter peer status page, you can choose Basic> Network > IPv4 multicast routing > MSDP > Peer status from
navigation tree, as shown in Figure3-82.
To enter cache status page, you can choose Basic> Network > IPv4 multicast routing > MSDP > Cache status
from navigation tree, as shown in Figure3-83.
3-112
DPtech FW1000 Series Firewall Products User Configuration Guide
3-113
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the multicast routing table page, you can choose Basic> Network > IPv4 multicast routing > Multicast
routing table from navigation tree, as shown in Figure3-89.
To enter the PIM multicast routing table page, you can choose Basic> Network > IPv4 multicast routing > PIM
multicast routing table from navigation tree, as shown in Figure3-90.
3-114
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IGMP multicast routing table page, you can choose Basic> Network > IPv4 multicast routing >
IGMP multicast routing table, as shown in Figure3-91.
To enter the IGMP proxy routing table page, you can choose Basic> Network > IPv4 multicast routing > IGMP
proxy routing table from navigation tree, as shown in Figure3-92.
3-115
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the basic config page, you can choose Basic> Network > IPv6 multicast routing > Basic config, as
shown in Figure3-93.
Item Description
Enabling status Select a status of basic config, including enable and disable.
To configure the basic config, you should take the following steps:
Select an interface will be enabled and then select the Enable status for the interface.
Configure the multicast address and subnet mask for the interface.
Click Ok button in the upper right corner on the webpage.
3.13.2 MLD
Multicast Listener Discovery (MLD) is a component of the Internet Protocol Version 6 (IPv6) suite. MLD is used by
IPv6 routers to discover multicast listeners on a directly attached link, much as IGMP is used in IPv4.
To enter the MLD snooping page, you can choose Basic> Network > IPv6 multicast routing > MLD snooping
from navigation tree, as shown in Figure3-94.
3-116
DPtech FW1000 Series Firewall Products User Configuration Guide
3.13.2.2 MLD
To enter the MLD page, you can choose Basic> Network > IPv6 multicast routing > MLD from navigation tree,
as shown in Figure3-95.
Figure3-95 MLD
To enter the MLD status page, you can choose Basic> Network > IPv6 multicast routing > MLD status, as shown
in Figure3-96.
3.13.3 PIM
Protocol Independent Multicast (PIM) provides IP multicast forwarding by leveraging static routes or unicast
routing tables generated by any unicast routing protocol, such as RIP, OSPF, IS-IS, BGP.
3-117
DPtech FW1000 Series Firewall Products User Configuration Guide
3.13.3.1 PIM
To enter the PIM page, you can choose Basic> Network > IPv6 multicast routing > PIM from navigation tree, as
shown in Figure3-97.
Figure3-97 PIM
To enter the admin scope zone page, you can choose Basic> Network > IPv6 multicast routing > PIM > Admin
scope zone from navigation tree, as shown in Figure3-98.
Item Description
3-118
DPtech FW1000 Series Firewall Products User Configuration Guide
To configure Global zone configuration, you can take the following steps:
Item Description
Operation
Click insert or delete icon to do the operations.
To configure global zone configuration, you should take the following steps:
Note:
After you enable the global zone configuration, global zone configuration can be used.
To enter the PIM status page, you can choose Basic> Network > IPv6 multicast routing > PIM > PIM status
from navigation tree, as shown in Figure3-99.
3-119
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the BSR status page, you can choose Basic> Network > IPv6 multicast routing > PIM > BSR status, as
shown in Figure3-100.
3.13.3.5 RP-Mapping
To enter the RP-Mapping page, you can choose Basic> Network > IPv6 multicast routing > PIM > RP-Mapping,
as shown in Figure3-101.
Figure3-101 RP-Mapping
3-120
DPtech FW1000 Series Firewall Products User Configuration Guide
The policy-based routing (PBR) is a routing mechanism based on user-defined policies that used to modify next
hoop address and marketing packet to provide different network service.
When the device transmitted packets, it will look up the route table of forward by route-policy before route, if
packets are not matched, the device will look up the static route table, if the packets are not matched, the device will
look up the route table of forward by route-policy after route.
The policy-based routing (PBR) of DPtech is a technology that recognize different network packets thus forward
these packets as the policy created in advance. PBR can classify the network packets according different key field
and decide which policy-based routing should be used. It can effectively control network streams and behaviors.
PBR is on the IP layer, before IP forwarded, if a massage match with a PBR policy, it will execute relatively action,
the actions includes redirect to the nexthop, remark (such as TOS, IP priority, DSCP), and then according to
destination IP address of the replaced packet of the nexthop to look up FIB table to do IP forwarding.
To enter the policy-based routing page, you can choose Basic> Network >Policy-based routing from navigation
tree, as shown in Figure3-103.
3-121
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Source subnet Allows you to configure the source IP address of the PBR policy.
Destination subnet Allows you to configure the destination IP address of the PBR policy.
Inbound interface Allows you to select which interface enabled the PBR policy.
Protocol Allows you to select which protocol should be used by the PBR policy
Operation
Click copy or delete or insert icon to do the operations.
3.14.2.2 Monitoring
To enter the monitoring page, you can choose Basic> Network >Monitoring from navigation tree, as shown in 错
误!未找到引用源。.
Figure3-104 Monitoring
To enter the policy-based routing interface, you can choose Basic> Network >Policy-based
routing >Policy-based routing from navigation tree, as shown in Figure3-105.
3-122
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Source subnet Allows you to configure the source IP address of the PBR policy.
Destination subnet Allows you to configure the destination IP address of the PBR policy.
Inbound interface Allows you to select which interface enabled the PBR policy.
Protocol Allows you to select which protocol should be used by the PBR policy
Operation
Click copy or delete or insert icon to do the operations.
3.14.3.2 Monitoring
To enter the monitoring page, you can choose Basic> Network >Policy-based routing > Monitoring from
navigation tree, as shown in Figure3-106.
3-123
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-106 Monitoring
3.15 MPLS
To enter the MPLS configuration page, you can choose Basic> Network >MPLS > Global configuration from
navigation tree, as shown in Figure3-107.
To enter the static FTN page, you can choose Basic> Network > MPLS > Configure FTN from navigation tree, as
shown in Figure3-108.
3-124
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the configure ILM page, you can choose Basic> Network > MPLS > Configure ILM from navigation
tree, as shown in Figure3-109.
3.15.3 LDP
To enter the LDP configuration page, you can choose Basic> Network > MPLS > LDP > LDP configuration
from navigation tree, as shown in Figure3-110.
To enter the display LDP neighbor page, you can choose Basic> Network > MPLS > LDP > Display LDP
neighbor from navigation tree, as shown in Figure3-111.
To enter the display LDP adjacency page, you can choose Basic> Network > Display LDP adjacency from
navigation tree, as shown in Figure3-112.
3-125
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the display LDP interface page, you can choose Basic> Network >Policy-based routing from navigation
tree, as shown in 错误!未找到引用源。.
To enter the L2VPN configuration, you can choose Basic> Network >MPLS > L2VPN configuration > L2VPN
configuration from navigation tree, as shown in Figure3-114.
Static Virtual Circuit (SVC) also implements MPLS L2VPN by static configuration. It transfers L2VPN
information without using any signaling protocol. The SVC method resembles the Martini method closely and is in
fact a static implementation of the Martini method.
To enter the SVC mode configuration, you can choose Basic> Network >MPLS > L2VPN configuration > SVC
mode from navigation tree, as shown in Figure3-115.
3-126
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the CCC mode configuration, you can choose Basic> Network >MPLS > L2VPN configuration > CCC
mode from navigation tree, as shown in Figure3-116.
To enter the MARTINI mode configuration, you can choose Basic> Network >MPLS > L2VPN configuration >
MARTINI mode from navigation tree, as shown in Figure3-117.
VPLS provides Layer 2 VPN services. However, it supports multipoint services, rather than the point-to-point
services that traditional VPN supports. With VPLS, service providers can create on the PEs a series of virtual
switches for customers, allowing customers to build their LANs across the Metropolitan Area Network (MAN) or
Wide Area Network (WAN).
To enter the VPLS mode configuration, you can choose Basic> Network >MPLS > L2VPN configuration >
VPLS mode, as shown in Figure3-118.
3-127
DPtech FW1000 Series Firewall Products User Configuration Guide
Address Resolution Protocol (ARP) is the protocol that converts IP address to the Ethernet MAC address. In local
area network, when the host or other network device send data to the other host or device, they must know the
network layer address (IP address) of each other. But only the IP address is not enough, because IP data packets runs
encapsulated by line protocol, so that the sender must know the receiver’s physical IP address and needs the IP
address and physical address mapping relationship. ARP protocol is used for this kind of requirement.
To enter the display ARP page, you can choose Basic> Network >ARP > Display ARP, as shown in Figure3-119.
To enter the static ARP display interface, you can choose Basic> Network > ARP > Static ARP, as shown in
Figure3-120.
3-128
DPtech FW1000 Series Firewall Products User Configuration Guide
A gratuitous ARP reply is a reply to which no request has been made. Gratuitous ARP could mean both gratuitous
ARP request and gratuitous ARP reply. Gratuitous in this case means a request/reply that is not normally needed
according to the ARP specification but could be used in some cases. A gratuitous ARP request is an Address
Resolution Protocol request packet where the source and destination IP are both set to the IP of the machine issuing
the packet and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff. Ordinarily, no reply packet will occur.
To enter the gratuitous page, you can choose Basic> Network > ARP > Gratuitous ARP from navigation tree, as
shown in Figure3-121.
To enter the configure ARP probe period page, you can choose Basic> Network > ARP > Configure ARP probe
period from navigation tree, as shown in Figure3-122.
3.16.2 Anti-ARP-snooping
3.16.2.1 Anti-ARP-snooping
To enter the anti-ARP-snooping page, you can choose Basic> Network > ARP > Anti-ARP snooping from
navigation tree, as shown in 错误!未找到引用源。.
3-129
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the ARP configuration page, you can choose Basic> Network > ARP> ARP configuration from
navigation tree, as shown in Figure3-124.
To enter the ARP log page, you can choose Basic> Network > ARP> ARP log, as shown in Figure3-125 .
To enter the MAC address manage page, you can choose Basic> Network > MAC address manage, as shown in
Figure3-126.
3-130
DPtech FW1000 Series Firewall Products User Configuration Guide
DNS domain name system is used to provide domain and IP address switching function for users.
3.18.2 DNS
To enter the DNS page, you can choose Basic> Network > DNS from navigation tree, as shown in Figure3-127.
Figure3-127 DNS
Enter the DNS server address and click the check box of DNS proxy.
Click Ok button in the upper right corner on the webpage.
DHCP allows administrator to monitor and distribute the IP address from central node. While a computer is moved
to other place in a network, it will automatically receive the new IP address, this facilitates user configuration and
centralized management. In a local network, the DHCP server is used to distribute IP address for every workstation
and the DHCP relay will distribute IP address when the local network is divided into several subnets, After DHCP
3-131
DPtech FW1000 Series Firewall Products User Configuration Guide
clients is enabled on an interface, the interface can dynamically obtain an IP address and other configuration
parameters from the DHCP server.
To enter the DHCP server page, you can choose Basic> Network > DHCP > DHCP server from navigation tree,
as shown in Figure3-128.
Item Description
Subnet mask Specify the subnet mask for the IP address pool.
Gateway address Specify the distributing gateway address for every host in the network.
Agent address Specify agent address for every host in the network.
DNS server Specify DNS server for every host in the network.
WINS server Specify the distributing WINS server for every host in the network.
3-132
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click copy or delete icon to do the operations.
Item Description
MAC address Specify the MAC address which is required to obtain the static IP address.
Operation
Click the copy icon or delete icon to do the operations.
To configure the dynamic DHCP address pool, you can take the following steps:
And then, enter the starting and ending IP address, which will be distributed by DHCP server.
Enter IP address subnet mask of the distributed address and enter the DHCP server gateway address.
Enter the DHCP domain name server address and then enter the WIN server address, which will allocate IP
address to the host.
Enter the specific region name and then select valid time
Click Ok button in the upper right corner on the webpage.
To create the static DHCP address pool, you can take the following steps:
3-133
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the DHCPv6 server page, you can choose Basic> Network > DHCP > DHCPv6 server from navigation
tree, as shown in Figure3-131.
To enter the DHCP relay agent page, you can choose Basic> Network > DHCP > DHCP relay agent, as shown in
Figure3-130.
Item Description
DHCP servers list Specify DHCP server IP address which provides DHCP service.
Operations
Click the delete icon, and then you can delete the address pool.
3-134
DPtech FW1000 Series Firewall Products User Configuration Guide
DHCP IP address table allows you to view the related information of the host allocated by DHCP server.
To enter the DHCP IP address table interface, you can choose Basic> Network > DHCP > DHCP IP address
table from navigation tree, as shown in Figure3-131.
Item Description
3.20 BFD
BFD is a detection protocol designed to provide fast forwarding path failure detection times for all media types,
encapsulations, topologies, and routing protocols.
3-135
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the BFD interface, you can choose Basic> Network > BFD, as shown in Figure3-132.
Item Description
To enter the BFD page, you can choose Basic> Network > BFD session from navigation tree, as shown in
Figure3-133.
3-136
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the BFD manual page, you can choose Basic> Network > BFD manual from navigation tree, as shown in
Figure3-134.
To enter the basic wireless address table interface, you can choose Basic> Network > Wireless from navigation
tree, as shown in Figure3-135.
3.22.1 Ping
Ping is used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time
for messages sent from the originating host to a destination computer.
To enter the PING page, you can choose Basic> Network > Diagnose tool > Ping from navigation tree, as shown in
Figure3-136.
Figure3-136 Ping
3.22.2 Traceroute
Traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of
packets across an Internet Protocol (IP) network.
To enter the Traceroute tool page, you can choose Basic> Network > Diagnose tool > Traceroute from navigation
tree, as shown in Figure3-137.
3-138
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-137 Traceroute
3.22.3 Capture
To enter the Capture page, you can choose Basic> Network > Diagnose tool > Capture from navigation tree, as
shown in Figure3-138.
Figure3-138 Capture
To enter the select STP page, you can choose Basic> Network > LAN Switch > Spanning tree > Select STP, as
shown in Figure3-139.
3-139
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
STP mode All ports of the device send out STP BPDUs.
RSTP mode All ports of the device send out RSTP BPDUs. If the device detects that it is connected with
a legacy STP device, the port connecting with the legacy STP device will automatically
migrate to STP-compatible mode.
MSTP mode All ports of the device send out MSTP BPDUs. If the device detects that it is connected
with a legacy STP device, the port connecting with the legacy STP device will
automatically migrate to STP-compatible mode.
3.23.1.2 STP
To enter the STP interface, you can choose Basic> Network > LAN Switch > Spanning tree > STP from
navigation tree, as shown in Figure3-140.
Figure3-140 STP
3.23.1.3 RSTP
To enter the RSTP page, you can Basic> Network > LAN Switch > Spanning tree > RSTP from navigation tree,
as shown in Figure3-141.
3-140
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure3-141 RSTP
3.23.1.4 MSTP
Spanning tree protocol (STP) is a layer 2 management protocol selectively block the redundancy links in a network
to eliminate layer 2 loop, it also can backup links.
To enter the MSTP interface, you can Basic> Network > LAN Switch > Spanning tree > MSTP from navigation
tree, as shown in Figure3-142.
Figure3-142 MSTP
Item Description
Revision level Allows you to configure the revision level of MSTP region.
3-141
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Start BPDU protection Select whether to enable the global BPDU protection function.
BPDU protection function can prevent the device from malicious attack by fabricate
configuration information, so that it can avoid network oscillation.
To enter the STP status, you can Basic> Network > LAN Switch > Spanning tree > MSTP, as shown in
Figure3-143.
3-142
DPtech FW1000 Series Firewall Products User Configuration Guide
Chapter 4 Firewall
Firewall module control incoming and outgoing data packet and block intrusion from outside network, the
followings are provided by firewall, including:
To enter the firewall menu, you can choose Basic> Network > Firewall > Packet filtering policy from navigation
tree, as shown in Figure4-1.
4-143
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure4-1 Firewall
Packet filtering is to inspect the source domain, destination domain, originator source IP, originator destination IP,
originator source MAC, originator destination MAC, service, IP fragment, flow re-mark, action for every data
packet.
To enter the packet filtering policy interface, you can choose Basic> Network > Firewall > Packet filtering policy
from navigation tree, as shown in Figure4-2.
4-144
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Serial number Displays the serial number of the packet filtering policy.
IP fragment Select whether to permit fragment packet passing through the device
Valid time Select a time range for the rule. By default, time range is the always. Always is the
packet filtering policy effect always.
Action Specify whether to permit packet pass the device and further limit packet filtering
policy.
Operation
Click copy icon, delete icon or insert icon to do the operations.
4-145
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Rate limitation Select rate limitation rule which will apply to the packet filtering policy.
Per IP rate limitation Select per IP limitation rule which will apply to the packet filtering policy.
Access control Select access control rule which will apply to the packet filtering policy.
URL filtering Select URL filtering rule which will apply to the packet filtering policy.
Advanced filtering Select advanced filtering rule which will apply to the packet filtering policy.
Behavior audit Select behavior audit rule which will apply to the packet filtering policy.
! Caution:
It performs default packet filtering policy if there is no packet match packet filtering policy. The default is that
interface with higher security level can access the interface with lower security level, but interface with lower
security level cannot access higher security level interface.
Packet filtering policy log query function is to query specific log in the database, but the premise is you should click
the select box before packet filtering policy.
To enter the packet filtering policy interface, you can choose Basic> Network > Firewall > Packet filtering policy
from navigation tree, as shown in Figure4-4.
To enter the IPv6 packet filtering policy page, you can choose Basic> Network > Firewall > Packet filtering
policy > IPv6 packet filtering policy from navigation tree, as shown in Figure4-5.
4-147
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IPv6 packet filtering log page, you can choose Basic> Network > Firewall > Packet filtering policy >
IPv6 packet filtering log from navigation tree, as shown in Figure4-6.
4.4 NAT
Network Address Translation (NAT) provides a way of translating the IP address in an IP packet header to another
IP address. Originally, NAT is used to allow users using private IP addresses to access public networks. By using of
NAT, a smaller number of public IP addresses can meet public network access requirements for a larger number of
private hosts, thus NAT can effectively alleviate the depletion of IP addresses.
To enter the source NAT page, you can choose Basic> Network > Firewall > Source NAT > Source NAT from
navigation tree, as shown in the Figure4-7.
4-148
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the address pool page, you can choose Basic> Network > Firewall > Source NAT > Address pool from
navigation tree, as shown in the Figure4-8.
To enter the destination NAT page, you can choose Basic> Network > Firewall > Destination NAT from
navigation tree, as shown in Figure4-9.
Item Description
Inbound interface Allows you to select an inbound interface for the destination NAT.
4-149
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click add icon or delete icon to do the operations.
To configure destination NAT configuration, you can take the following steps:
Note:
If you configure the server inner port in the advanced configuration, it will connect to the destiantion port after it
switched destination NAT.
One to one NAT is that an internal network user accesses an external network that NAT uses an external or public IP
address to replace the original internal IP address. This address is the outbound interface address (a public IP
address) of the NAT gateway. This means that all internal hosts use the same external IP address when accessing
external networks. If only one host is allowed to access external networks at a given time. Hence, it is referred to as
“one-to one NAT”.
To enter the one to one NAT page, you can choose Basic> Network > Firewall > One to one NAT from navigation
tree, as shown in Figure4-10.
4-150
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Destination
Serial number Displays the serial number of one to one NAT policy.
Public interface Displays the outbound interface of one to one NAT policy.
One to one NAT Displays the inner address of one to one NAT policy.
Public address Displays the public address of one to one NAT policy.
Operation
Click copy or delete icon to do the operations.
To configure one to one NAT configuration, you can take the following steps:
4.4.5 N to N NAT
When the first internal host accesses external networks, NAT chooses a public IP address for it, records the mapping
between the two addresses and transfers data packets. When the second internal host accesses external networks,
NAT choose another public IP address for the second host, others will be followed by such kind of operations. This
kind of NAT is called “N- to-N NAT”.
To enter the N to N NAT page, you can choose Basic> Network > Firewall > N to N NAT from navigation tree, as
shown in Figure4-11.
4-151
DPtech FW1000 Series Firewall Products User Configuration Guide
Figure4-11 N to N NAT
Item Description
Operation
Click copy or delete icon to do the operations.
To configure address pool configuration, you can take the following steps:
Configure ID number
Configure start IP
Configure end IP
After you finished the above steps, you can click Ok button in the upper right corner on the webpage.
4.5 NAT64
Network Address Translation IPv6 to IPv4 (NAT64 for short) is a mechanism to allow IPv6 hosts to communicate
with IPv4 servers. The NAT64 server is the endpoint for at least one IPv4 address and an IPv6 network segment of
32-bits (for instance 64:ff9b::/96, that is NAT64 prefix). The IPv6 client embeds the IPv4 address it wishes to
communicate with using these bits, and sends its packets to the resulting address. The NAT64 server then creates a
NAT-mapping between the IPv6 and the IPv4 address, allowing them to communicate.
4-152
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the NAT64 prefix page, you can choose Basic> Network > Firewall > NAT64 prefix from navigation tree,
as shown in Figure4-12.
To enter the NAT64 transfer page, you can choose Basic> Network > Firewall > NAT64 address from navigation
tree, as shown in Figure4-13.
To enter the address pool page, you can choose Basic> Network > Firewall > Address pool from navigation tree,
as shown in Figure4-14.
4-153
DPtech FW1000 Series Firewall Products User Configuration Guide
4.6 NAT66
To enter the NAT66 source NAT page, you can choose Basic> Network > Firewall > NAT> Source NAT from
navigation tree, as shown in Figure4-15.
To enter the NAT66 destination NAT page, you can choose Basic> Network > Firewall > NAT > Destination
NAT from navigation tree, as shown in Figure4-16.
To enter the NAT66 address pool page, you can choose Basic> Network > Firewall > NAT > Address pool from
navigation tree, as shown in Figure4-17.
4-154
DPtech FW1000 Series Firewall Products User Configuration Guide
4.7 DS_LITE_NAT
Because of IPv4 address exhaustion, DS _Lite was designed to let an Internet service provider omit the deployment
of any IPv4 address to the customer's Customer-premises equipment (CPE). Instead, only global IPv6 addresses are
provided.
4.7.1 DS_LITE_NAT
To enter the DS_LITE_NAT page, you can choose Basic> Network > Firewall > DS_LITE_NAT from
navigation tree, as shown in Figure4-18.
Figure4-18 DS_LITE_NAT
To enter the address pool page, you can choose Basic> Network > Firewall > Address pool from navigation tree,
as shown in Figure4-19.
Application level gateway (ALG) is mainly to process the application layer packets. Usually, NAT only translate the
IP address and port number carried in packet header while it doesn’t translate the fields in the payload of application
layer. NAT can’t effectively translate the IP address and port number in the payload of some special protocols,
which may result problems.
4-155
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the ALG configuration page, you can choose Basic> Network > Firewall > ALG configuration from
navigation tree, as shown in Figure4-20.
To enter the user-defined log interface, you can choose Basic> Network > Firewall > User-defined log from
navigation tree, as shown in Figure4-21.
Sometimes, normal packets transmitted in the network with attack packets which interference hosts receiving
normal packets. Basic attack protection block attack packets and send logs to a remote host or displays logs on local
device.
To enter the basic attack protection page, you can choose Basic> Firewall > Basic attack protection from
navigation tree, as shown in Figure4-22.
4-156
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Block Click the select box of the basic attack protection, which enable the relevant
protocol attack protection.
Send log Click the select box and then you can view the log while attack packet transmitted
through the device interface.
Time interval(per second) Select how much time it sending log per second.
Terms interval Select how many log it report the new log.
4-157
DPtech FW1000 Series Firewall Products User Configuration Guide
Basic attack log query allow you to query the specific log from the database.
To enter the basic attack lo query interface, you can choose Basic> Firewall > Basic attack protection > Basic
attack log query from navigation tree, as shown in Figure4-23.
Item Description
4-158
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the network action manage, you can choose Basic> Firewall > Basic attack protection > Network action
manage from navigation tree, as shown in Figure4-24.
Session entries occupy certain of internal memory. If there too many session entries on the device, these entries
occupy large amount of internal memory and influence other service to be performed.
User can configure session limit to limit the new created session on the device. When session number reaches the
device’s maximum session number, new session could not be created; only if the session number smaller than the
maximum session number that the device can allow to create new session.
To enter the session limit page, you can choose Basic> Firewall > Sessions Limit from navigation tree, as shown in
Figure4-25.
4-159
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the service limit page, you can choose Basic> Firewall > Service Limit from navigation tree, as shown in
Figure4-26.
4.13 Blacklist
Blacklist is an attack prevention mechanism that filters packets based on source IP address. Blacklist feature can be
easily configured and filter packets source from particular IP addresses fast.
To enter the IPv4 blacklist configuration page, you can choose Basic> Firewall > Blacklist from navigation tree, as
shown in Figure4-27.
Item Description
Option Click the Enable IPv4 black list check box to enable this function.
Remaining life time Displays the last configuration record that you can view the valid time and life
cycle.
Status Allows you to select the status for the IPv4 blacklist configuration.
4-160
DPtech FW1000 Series Firewall Products User Configuration Guide
To configure the black list, you can take the following steps:
To enter the IPv6 black list configuration page, you can choose Basic> Firewall > Blacklist query from navigation
tree, as shown in Figure4-28.
To enter the black list query page, you can choose Basic> Firewall > Black list query from navigation tree, as
shown in Figure4-29.
Item Description
Remaining time Displays the remaining time and the time when you create the black list.
4-161
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the blacklist log query page, you can choose Basic> Firewall > Blacklist Log Query from navigation tree,
as shown in Figure4-30.
Item Description
Add reasons Displays the IP address is added, including Manual and Dynamic.
To query the blacklist log, you should take the following steps:
Auto learning is that the firewall receives ARP packets sent by each host, so that the firewall can get the IP address
and MAC address of each host.
4-162
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the auto learning page, you can choose Basic> Firewall > MAC/IP binding >Auto learning from
navigation tree, as shown in Figure4-31.
Figure4-31 Auto-learning
Item Description
Option Allows you to select one item or several items to add into the MAC/IP binding list.
Binding status Displays MAC/IP binding status, including not bind and already bind.
To each Layer 2 network mode auto-learning, you should take the following steps:
Click the Layer 2 mode network radio box, click Auto-learn button.
Click Check current learned result button that you can view the MAC/IP learning result.
Click Add to MAC/IP binding learning button, the MAC/IP address is added into MAC/IP binding list.
To each Layer 3 network mode auto-learning, you should take the following steps:
Click the Layer 3 mode network radio box, configure switch IP address and SNMP community string, and
click Auto-learn button.
Click Check current learned result button that you can view the MAC/IP learning result.
Click Add to MAC/IP binding learning button, the MAC/IP address is added into MAC/IP binding list.
4-163
DPtech FW1000 Series Firewall Products User Configuration Guide
User configure the IP address-to-MAC address binding relationship on the firewall, so that the firewall checks the IP
address and MAC address in a packet and compares them to the addresses that are registered with firewall and
forwards the packet only if they both match. MAC/IP binding can avoid IP address forgery attack.
To enter the MAC/IP binding page, you can choose Basic> Firewall > MAC/IP address from navigation tree, as
shown in Figure4-32.
Item Description
MAC/IP binding (only appointed address Click the MAC/IP binding (only appointed address pass) checkbox that only
pass) appointed address can pass through the device.
MAC address Configure the MAC address of the MAC/IP binding list.
Operation
Click copy icon or delete icon to do the operations.
To create MAC/IP binding rule, you should take the following steps:
Item Description
Operation
Click copy icon or delete icon to do the operations.
User/IP binding should be used with the web authenticate function. With username and IP address binding function
configured, an interface checks whether the username and IP addresses in packet is identical. If so, it forwards the
packet; otherwise, it discards the packet.
To enter the User/ IP binding page, you can choose Basic> Firewall > MAC/IP binding > User/IP binding from
navigation tree, as shown in Figure4-33.
Item Description
Binding mode Manual configuration: add username and IP address through manual configuration.
Automatic learning: learn username and IP address from the switch.
4-165
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click the copy icon or delete icon to do the operations.
To add username and IP address through manual configuration, you should take the following steps:
User/MAC binding should be used with the web authenticate function. With username and IP address binding
function configured, an interface checks whether the username and IP addresses in packet is identical. If so, it
forwards the packet; otherwise, it discards the packet.
To enter the User/ MAC binding page, you can choose Basic> Firewall > User/MAC binding from navigation tree,
as shown in Figure4-34.
4-166
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Binding mode Manual configuration: add username and IP address through manual configuration.
Automatic learning: learn username and IP address from the switch.
Operation
Click the copy icon or delete icon to do the operations.
To add user name and MAC address by manual configuration, you should take the following steps:
To add user name and MAC address automatically, you should take the following steps:
Click Automatic learning, can also be manually configured radio box to enable this function.
4-167
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Time Displays the time that the device detects the unmatched IP address and MAC
address.
MAC address Displays the MAC address that unmatched with MAC/IP binding list.
Detailed information Displays the detailed information about MAC/IP binding log.
To query MAC/IP binding log, you should take the following steps:
4-168
DPtech FW1000 Series Firewall Products User Configuration Guide
Session management is mainly used for detecting translation layer data packets. Its substance is to trace the
connection status for general TCP protocol and UDP protocol through layer protocol detection, which maintain and
manage connection status uniformly.
To enter the session list page, you can choose Basic> Firewall > Session Management > Session List from
navigation tree, as shown in Figure4-36.
Item Description
Protocol type Transport layer protocol type, including TCP, UDP, ICMP, ICMPv6, GRE, AH,
ESP, and Unknown protocol.
Session status Displays session status, including new, close-wait, established, time-wait, etc.
Initiator Source Address: Port->Destination Displays the source port and destination port of the session initiator.
Address: Port
Initiator Packets/Bytes Displays the total packet numbers send by session initiator.
4-169
DPtech FW1000 Series Firewall Products User Configuration Guide
Responder Source Address: Port->Destination Displays the source port and destination port of the session responder.
Address: Port
Responder Packets/Bytes Displays the total packet numbers received by session initiator.
Operation
Click delete icon to delete this entry of session record.
To enter the session zone page, you can choose Basic> Firewall > Session Management > Session zone from
navigation tree, as shown in Figure4-37.
After you enable this function, response packets will be forwarded by using of original interface. Original interface
is the interface that request packets come into the device.
To enter the session forwarding page, you can choose Basic> Firewall > Session Management > Session
forwarding from navigation tree, as shown in Figure4-38.
To enter the session parameter page, you can choose Basic> Firewall > Session Management > Session
parameter from navigation tree, as shown in Figure4-39.
4-170
DPtech FW1000 Series Firewall Products User Configuration Guide
Session monitoring allows you to select a kind of session or multiple sessions to display. The session monitoring
displays as a trend chart.
To enter the session monitoring page, you can choose Basic> Firewall > Session Management > Session
Monitoring from navigation tree, as shown in Figure4-40.
To enter the session log configuration page, you can choose Basic> Firewall > Session Management > Session
Log Configuration from navigation tree, as shown in Figure4-41.
4-171
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Log type Allows you to select the log type, including NAT log and session log.
Log format Allows you to select the log format, including stream format and syslog format.
Stream format log: binary format log which received by UMC server.
Syslog format log: plain text log received by log server.
Content format type Allows you select the stream format log and syslog format.
Normal: sending log as normal format.
Third party: sending log as third part log format.
Log option If you select the stream format option, you can configure the inbound interface of
packet option and select the PROCID options.
Inbound interface of packet: if you enable this option, the interface
information field will be added into data packet.
PROCID: if you enable this option, the PROCID field will be added into data
packet.
If you select the syslog formation option, you can select syslog1, syslog2, syslog3,
syslog4 format log.
Guangdong Unicom format: syslog data packets transmitted as Guangdong
Unicom format.
Yunnan Telecom format: syslog data packets transmitted as Yunnan Telecom
format.
China Telecom format: syslog data packets transmitted as China Telecom
format.
4-172
DPtech FW1000 Series Firewall Products User Configuration Guide
Method for sending log Allows you to select the log sending method, including share mode and send all.
Share mode: the device sends logs to log server according load sharing
method. You can configure 16 servers to receive logs at most, and you can
configure load sharing weight for the 16 servers.
Send all: the device sends all logs to the log server.
Log server list Allows you configure IP address and weight for log server.
Log server port: Allows you to configure the log server port. The port number is 9505.
4.16 QoS
QoS is a kind of network mechanism which is used for resolving the problem of network delay and network
congestion. If the network only limited on some specific applications, such as web application or E-mail, without
time limitation, QoS does not required. But, it is very important for multilayer application. When network overload
or network congestion happens, QoS can ensure the network working efficiently and ensure some important
services to will not be delayed or discarded.
To enter the basic setting page, you can choose Basic> Firewall > QOS> Basic setting from navigation tree, as
shown in 错误!未找到引用源。.
Item Description
4-173
DPtech FW1000 Series Firewall Products User Configuration Guide
Operation
Click copy icon or delete icon to do the operations.
User group bandwidth reservation allocates service stream according to the importance of service stream and delay
sensibility, thus can make the most use of available bandwidth. If network congestion happens, low priority service
will be discarded.
Bandwidth reservation: in order to provide user with satisfying QoS, you must reserves the bandwidth resource to
ensure the resource will not be used.
To enter the VIP bandwidth guarantee interface, you can choose Basic> Firewall > QOS> Traffic classification,
as shown in Figure4-43.
To enter the single user bandwidth reservation page, you can choose Basic> Firewall > QOS> Single user
bandwidth reservation, as shown in 错误!未找到引用源。.
Advanced QoS consists of the traffic marking, congestion management, congestion avoidance, and traffic shaping
function. It executes Weighted Round Robin (WRR), Deficit Round Robin (DRR) scheduling method for IP packets
and implements Weighted Random Early Detection (WRED), traffic policy and traffic shaping for IP packets.
Traffic classification is used for doing QoS action for data packets.
Priority mapping table: the device provides multiple priority mapping tables, which represents different priority
mapping relationship respectively. Under normal condition, the device looks up default priority mapping for data
packets. If default priority mapping table cannot satisfied with users, user can modify mapping table according to
their requirement.
To enter the traffic classification page, you can choose Basic> Firewall > QOS> Traffic classification, as shown
in Figure4-45.
Item Description
COS CoS is a 3-bits field in a packet header. It specifies a priority value between 0 and 7, more
commonly known as CS0 through CS7, which is used by quality of service (QoS).
EXP EXP is a 3-bits field in MPLS packet header. It specifies a priority value between 0 and 7. By
default, the priority EXP and IPv4 can match with each other.
4-176
DPtech FW1000 Series Firewall Products User Configuration Guide
DSCP DiffServ uses a 6-bit differentiated services code point (DSCP) in the 8-bit Differentiated services
Field (DS field) in the IP header for packet classification purposes. The DS field and ECN field
replace the outdated IPv4 TOS field. It specifies a priority value between 0 63. When QoS
executed, router will inspect data packet priority.
IPsec VPN Click IPsec VPN checkbox to enable IPsec VPN QoS function.
SSL VPN Click SSL VPN checkbox to enable SSL VPN QoS function.
Customize session parameter Classifies data packet as IP packet quintuple. IP packet quintuple includes protocol, source IP
address, destination IP address, source port, destination port.
When network congestion increase, it drops packets actively and adjusts network traffic to eliminate network
overload problem.
To enter the congestion avoidance page, you can choose Basic> Firewall > QoS> Congestion avoidance, as
shown in Figure4-46.
Item Description
Enabling connection
Operation
4-177
DPtech FW1000 Series Firewall Products User Configuration Guide
We adopt the queuing technology for congestion management generally. If we use queue algorithm for traffic
classification, then we use a kind of priority algorithm to send out the traffic. Each queue algorithm is used for
resolve the specific network traffic problems, which influences bandwidth resource allocation, time delay, Jitter.
The processing of congestion management includes the queue creation, packet classification, sending different
packet to different queue, queue scheduling.
To enter the congestion management page, you can choose Basic> Firewall > QoS> Congestion management, as
shown in Figure4-47.
Item Description
Operation
Click the copy icon, and then you can copy a rule of congestion management.
Click the delete icon, and then you can delete a rule of congestion management.
4-178
DPtech FW1000 Series Firewall Products User Configuration Guide
4.18 Anti-ARP-Spoofing
4.18.1 Anti-ARP-Spoofing
To enter the Anti-ARP-Spoofing interface, you can choose Basic> Firewall > Anti-ARP-Spoofing, as shown in
Figure4-49.
Figure4-49 Anti-ARP-Spoofing
4-179
DPtech FW1000 Series Firewall Products User Configuration Guide
Table4-23 Anti-ARP-Spoofing
Item Description
The Address Resolution Protocol (ARP) is used to resolve an IP address into a physical address (Ethernet MAC
address, for example). In an Ethernet LAN, when a device sends data to another device, it uses ARP to translate the
IP address of that device to the corresponding MAC address.
To enter the ARP configuration page, you can choose Basic> Firewall > ARP configuration, as shown in
Figure4-50.
Item Description
4-180
DPtech FW1000 Series Firewall Products User Configuration Guide
System log
Operation log
Business log
To access the log management interface, you can click Basic > Log management, as shown in Figure5-1.
5-181
DPtech FW1000 Series Firewall Products User Configuration Guide
To export the system log to the local system, click Export button, and then you can made a choice from the pop up
window that you can view the system log as CSV file or save it to the local system.
Table5-1 describes the details of latest log. You can click the grey items of each column to sort and display the
records based on the item you selected.
Item Description
5-182
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Note:
Auto-refresh can be set as 10, 30, 60 second and it can refreshed as if you click the auto-refresh button and set the
specific time, and it also can be refreshed as if you click the refresh button.
Shading color is used in warning user and represent the severity of system log
Red color stands for fatal error, emergency and serverity
Orange color stands for common error and warning
White color stands for status, informaiton, unkown informaiton
System log query provides users with system log querying function.
To access the system log query interface, you can click Basic > Log management > System log > System log
query. System log query allows you to query the logs according to different condition, as shown in Figure5-3.
Click Export button, make a choice for the pop-up window, select whether to open or save the system log file.
Click Query button to view the logs.
Click the drop-down list of Jump to or Per page that you can view the logs as you desired.
5-183
DPtech FW1000 Series Firewall Products User Configuration Guide
Note:
You can select customize time scope and clik Query button, then you can view all system logs you’ve queried.
Item Description
System log file operation provides users with system save and delete as today and the desired day.
To enter the system log file operation interface, you can click Basic > Log management > System log > Log file
operation, as shown in Figure5-4.
Note:
Click Save icon that you can save the system log file on your local system.
Click delete icon that you can delete the system log file.
Table5-3 describes the details of system log file operation. System log file can be saved or deleted as you desired.
5-184
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Log file name Shows the time of system log creating, today is the current time.
System log configuration provides users with system log save and export configuration.
To enter system log configuration, you can click Basic > Log management > System log configuration, as shown
in Figure5-5.
Table5-4 describes the details of system log configuration. You can save log file on your device or export the log file
to your local system.
Item Description
Export to remote log server Set the remote server parameter, it includes
Remote syslog server IP address
Service port
Time stamp
The system will delete the expired system log by your selection which includes one week, two
Days for saving
week and three week, 30 days or customize. You can set specific days for saving system log.
5-185
DPtech FW1000 Series Firewall Products User Configuration Guide
Single click Export button on the bottom, and then you can make a choice from the system prompt window that you
can view the system log as CSV format or export CSV log file to the local system,
Table5-5 describes the details of the latest log and you can sort the log table by clicking their headline.
Item Description
5-186
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Note:
Auto-refresh can be refreshed by the system in every 10,30,60 second as your selecton if you click the auto-refresh
button. Click refresh button, you can refresh the operation log interface.
5-187
DPtech FW1000 Series Firewall Products User Configuration Guide
Click the export button, and then you can make a choice from the pop up window that you can open the file to view
the log content or save the operation log to the local system.
And then click the search button and then you can view all operation logs.
You can view the operation log as your selection if you click the drop-down list of page and pieces
Note:
If you select customize as time scope and click search button, the system will you the whole content of operation
log.
Table5-6 describes the details of operation log query which provides you operation log query function.
Item Description
Log file operation provides operation log back up or delete function. You can back up or delete today or the desired
day operation log.
To enter the interface, you can click Basic > Log management > Operation log > Log file operation, as shown in
Figure5-8.
Click back up button of the operation log file and you can export the log file to local system.
Click delete button of the operation log file and you can export the log file
5-188
DPtech FW1000 Series Firewall Products User Configuration Guide
Operation log file provides back up or delete operation log file as today or the desired day.
Item Description
Log file name Shows when the operation log file generating, today is the current time
Operation log configuration provides operation log configuring with users. You can save or export operation log as
your configuration.
To enter operation log configuration interface, you can click Basic > Log management > Operation log >Log file
operation, as shown in Figure5-9.
Table5-8 describes the details of operation log configuration. You can save or export the operation log to the local
system.
Item Description
Export to remote server Set the export to remote server configuration, including
Remote syslog server IP address
Service port
Time stamp format
Days for saving The system will delete the expired operation log by your selection which includes one week,
two week and three week, 30 days or customize. You can set specific days for saving system
log.
5-189
DPtech FW1000 Series Firewall Products User Configuration Guide
Table5-9 describes the details of operation log configuration. You can save or export the operation log to the local
system.
Item Description
Days for saving The system will delete the expired service log by your selection which includes one week, two
week and three week, 30 days or customize. You can set specific days for saving system log.
Output to a remote syslog server Configuring the output to a remote syslog server function, including
Remote syslog server IP address
Service port
5-190
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
The number of emails sent out Configuring the e-mail sent frequency
every minute
6-191
DPtech FW1000 Series Firewall Products User Configuration Guide
In the information age, people more and more rely on network. In order to avoid the network availability risk of an
ISP exit fault and solve the network access problem caused by bandwidth resource limitation, enterprise will hire
two or more ISP links (Such as China Telecom, China Netcom). How to reasonably use ISP’s multiple links, which
will not cause network resources waste and better services enterprises? Traditional routing strategy can solve the
problem in some extent, but the inconvenient and inflexible configurations can’t dynamically adapt the network
structure change and can’t distribute packet according to bandwidth that you cannot take full advantage of the high
throughput link. Through dynamic algorithm, link load balancing technology is capable of balancing the network
flow on multiple links, which algorithm is simple and self-adaptive.
To enter the interface config interface, you can choose Service > Load balancing > Link config, as shown in
Figure6-1.
6-192
DPtech FW1000 Series Firewall Products User Configuration Guide
Click Add configuration button, you can view the basic configuration of the ISP, as shown in Figure6-2.
To enter the interface config interface, you can choose Service > Load balancing > Link config, as shown in
Figure6-3.
6-193
DPtech FW1000 Series Firewall Products User Configuration Guide
6.1.4 ISP
To enter the ISP interface, you can click Service > Load balancing > ISP, as shown in Figure6-3.
6-194
DPtech FW1000 Series Firewall Products User Configuration Guide
Network traffic can be divided into several service types according to different network protocols such as HTTP
service, FTP service, E-mail service that can be implemented different rate limitation is call bandwidth rate
limitation.
To access the access control menu, you can choose Service > Access control, as shown in Figure7-1.
7-195
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the rate limit interface, you can choose Service > Access control > Rate limit > Rate limit, as shown in
Figure7-2.
Item Description
Time Select a time scope. User group limitation takes effect as your selection.
Disable Click the option that user group limitation will be disabled.
To create the user group limit, you can take the following steps:
Configure a name for the user group limit.
And then select a status for the rule of rate limitation.
Select a service and then configure upstream and downstream parameter for the service.
Click Ok button in the upper right corner on the webpage.
7-196
DPtech FW1000 Series Firewall Products User Configuration Guide
You can configure the user group parameter, including net user group, uplink and downlink rate speed, unit(bps).
Item Description
To enter the single user limit interface, you can choose Service > Access control > Rate limitation > Single user
limit, as shown in Figure7-4.
7-197
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Time Select a service and then configure upstream and downstream parameter for the
service.
Disable Click the option that user group limitation will be disabled.
To create the rule of the rate limitation, you can take the following steps:
Configure a name for the rule of rate limitation.
And then select a status for the rule of rate limitation.
Select a service and then configure upstream and downstream parameter for the service.
Click Ok button in the upper right corner on the webpage.
7-198
DPtech FW1000 Series Firewall Products User Configuration Guide
Table7-4 describes the configuration items of the single user rate limit parameter.
Item Description
! Caution:
Rate limitation is to limit user’ communiation between inside network and outside, while it can’t limit the
communitcation in same network.
Rate limiation is to control the sum of the newwork bandwith of all users correspond to the rule.
Rate limitation per IP address is control the bandwidth of single user correspond to the rule.
To enter group management interface, you can choose Service > Access control > Rate limitation > Group
management, as shown in Figure7-6.
7-199
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter network application browsing interface, you can choose Service > Access control > Rate limitation >
Browsing, as shown in Figure7-7.
On the firewall device, you can configure rate limitation, working mode of the network configuration is layer 3
interface, and then you can configure marketing department IP segment is 192.168.3.2-192.168.3.10, exclude the IP
address192.168.3.6, research department IP segment is 192.168.4.0/24, exclude IP address 192.168.4.8, and then
you can do the following operations:
Per IP address rate limitation for the marketing department for file transfer is that: upstream 10kbps
Rate limitation for the research and development department for the HTTP download: downstream 1Mbps
7-200
DPtech FW1000 Series Firewall Products User Configuration Guide
Choose Basic > Network management > Network user group > IP user group
WAN interface: eth0/3, access method: PPPoE, type the name and password provided by ISP.
LAN interface: : eth0/0, IP address: 192.168.3.0, subnet mask: 24, eth0/5, IP address:192.168.4, subnet
mask:24,and then click the Ok button.
Choose Basic > Network management > Network user group > IP address to enter the IP address page.
7-201
DPtech FW1000 Series Firewall Products User Configuration Guide
Click the add button and type the name: research and development department.
IP address range: 192.168.4.0-192.168.4.255, mask: 24 exclude IP: 192.168.4.8. Click the Ok button in the
upper right corner.
Choose Service > Access control > Rate limitation > to enter the rate limitation interface.
Create a rule of the rate limitation: such as bandwidth1
Type a name for the rate limitation rule: bandwidth1
Select the Enable status
Configure rate limitation parameter, select a type of service: file transfer and configure rate limitation as:
1Mbps
Click the Ok button in the upper right corner on the webpage.
Click rate limitation per IP address select tab
Create a rule of the rate limitation per IP address: bandwidth2
Configure a name for the rate limitation: bandwidth2
Select the Enable status
Configure rate limitation parameter, select a type of service: HTTP download and configure the rate limitation
as: 1Mbps
Click Ok button in the upper right corner on the webpage.
Choose Basic > Network management > Network object > Security zone to enter the security zone
interface.
Select trust security zone, interface: eth0/0 and eth0/5
Select untrust security zone, interface: eth0/3
Click Ok button in the upper right corner on the webpage.
Reference the above mentioned IP address, security zone and rate limitation rule to packet filtering policy.
The device according to the application protocol to which receiving packets belong decides the service to which
packet belongs and blocks all packets for this kind of service.
7-202
DPtech FW1000 Series Firewall Products User Configuration Guide
To access to the access control interface, you can choose Service > Access control > Access control, as shown in
Figure7-8.
Item Description
Network application group Select a name for the network application group.
Action set Select black list or white list for the rule of access control.
Operation
Click copy or delete icon to do the operations.
To create the rule of the access control, you can take the following steps:
! Caution:
Access control is to restrict the communication between inside network and outside network, while, it can not restict
the communiation in the same network.
To enter group management interface, you can choose Service > Access control > Rate limitation > Group
management, as shown in Figure7-9.
7-203
DPtech FW1000 Series Firewall Products User Configuration Guide
To configure the network application group management, you can take the following steps:
In the left box, the system pre-defined box, double click the user-defined application, and then you can configure a
name for it.
Click edit icon that you can select a kind of protocol and configure port number.
Click add button that you can add entry of the user-defined application.
Click delete button that you can delete an entry of the user-defined application.
In the right box, the user-defined application group box, double click the node of application group and configure a
name for it.
Click add button that you can add entry of the user-defined application group.
Click delete button that you can delete an entry of the user-defined application group.
Click node of the system pre-define tree and drag the node from left side box, the system-predefined box to the right
box, to the user-defined tree, that is, you add an application for one network application group.
Click the node of the user-defined tree and then you can configure rate limitation priority of the node.
To enter network application browsing interface, you can choose Service > Access control > Rate limitation >
Browsing, as shown in Figure7-10.
7-204
DPtech FW1000 Series Firewall Products User Configuration Guide
On the firewall device, you can configure the access control for the marketing department, IP segment is
192.168.3.2-192.168.3.10, exclude the IP address192.168.3.6, and then do the following operations:
For the marketing department, block Tencent QQ, PPLivet.
7-205
DPtech FW1000 Series Firewall Products User Configuration Guide
Choose Basic > Network management > Network user group > IP user group
WAN interface: eth0/3, access method: PPPoE, type the name and password provided by ISP.
LAN interface: : eth0/0, IP address: 192.168.3.0, subnet mask: 24, eth0/5, IP address:192.168.4, subnet
mask:24,and then click the Ok button.
Choose Basic > Network management > Network user group > IP address to enter the IP address page.
7-206
DPtech FW1000 Series Firewall Products User Configuration Guide
Choose Service > Access control > Group management to enter the group management interface.
Create an application group, yyz, from the user-defined tree drag Tencent QQ and PPLive to the yyz.
Select Access control selection tab
Create an access control rule: bandwidth3
Configure a name for the access control rule: bandwidth3
Network application group: yyz
Select blacklist and click the send log option
Click Ok button in the upper right corner on the webpage.
Reference the above mentioned IP address, security zone and rate limitation rule to packet filtering policy.
Uniform Resource Locator (there refer to URL hereinafter) is a kind of webpage filtering function, support HTTP
request packet filtering according to IP address, host name, regular expression. The realization of URL filtering
function rely on the URL filtering database which allow user to flexible configure URL filtering rule for the URL
filtering.
To enter the URL classification filtering interface, you can choose Service > Access control > URL filtering >
Classification, as shown in Figure7-11.
Item Description
Filtering classification Upgrade the signature database to obtain the system classification or customize
your classification.
7-207
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Configure URL filtering parameter; you can select the customized URL
classification.
Operation
Click the copy icon to copy an entry of the URL filtering rule.
Click the delete icon to delete an entry of the access control rule.
To access the customize URL classification interface, you can choose Service > Access control > URL filtering >
Customize, as shown in Figure7-12.
Item Description
Operation
Click the copy icon to copy an entry of the customized URL filtering rule.
Click the delete icon to delete an entry of the customized URL filtering rule.
7-208
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the advanced URL filtering interface, you can click Service > Access control > URL filtering >
Advanced URL filtering, as shown in Figure7-13.
Item Description
Black/white list Select an action for the advanced URL filtering rule.
Blacklist log
White list log
Operation
Click the copy icon to copy an entry of the advanced URL filtering rule.
Click the delete icon to delete an entry of the advanced URL filtering rule.
To create an advanced URL filtering rule, you can take the following steps:
Configure the URL filtering policy and configure name for the rule
Configure filtering parameter for the rule.
Select blacklist and then enable the send log function and the page push function.
Click Ok button in the upper right corner on the webpage.
7-209
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Filter parameter In the filter parameter column, you should configure the filter parameter:
IP address: filtering according to the IP address.
Host name: filtering according to the host name.
Regular expression: filtering according to the content restricted by regular
expression.
Operation Click the copy icon that you can copy an entry of the filter parameter.
Click the delete icon that you can delete an entry of the filter parameter.
To enter the URL filter page push interface, you can choose Service > Access control > URL filter page push, as
shown in Figure7-15.
7-210
DPtech FW1000 Series Firewall Products User Configuration Guide
The URL filter page push provides the custom template allowing user to customize the page push information, as
shown in Figure7-16.
On the firewall device, you can configure rate limitation, working mode of the network configuration is layer 3
interface, and then you can configure marketing department IP segment is 192.168.3.2-192.168.3.10, exclude the IP
address192.168.3.6, research department IP segment is 192.168.4.0/24, exclude IP address 192.168.4.8, and then
you can do the following operations, and view the logs by using of the 3CDaemon
7-211
DPtech FW1000 Series Firewall Products User Configuration Guide
The following is the network diagram for the URL configuration, as shown in Figure7-17.
Choose Basic > Network management > Network user group > IP user group
WAN interface: eth0/3, access method: PPPoE, type the name and password provided by ISP.
LAN interface: : eth0/0, IP address: 192.168.3.0, subnet mask: 24, eth0/5, IP address:192.168.4, subnet
mask:24,and then click the Ok button.
Choose Basic > Network management > Network user group > IP address to enter the IP address page.
Click the add button and type the name: research and development department.
IP address range: 192.168.4.0-192.168.4.255, mask: 24 exclude IP: 192.168.4.8. Click the Ok button in the
upper right corner.
Choose Service > Access control > Advanced > to enter the advanced URL interface.
Create a rule for the advanced URL configuration: such as URL1.
Type a name for the advanced URL configuration: such as URL1.
Configure filter parameter, select IP address and then configure 202.202.100.101, host name:
news.sina.com.cn and then click Confirm button.
And then select white list and click the send log option.
Click the Ok button in the upper right corner on the webpage.
! Caution:
All rules configured in the access control module must be reference to the packet filtering policy.
7-213
DPtech FW1000 Series Firewall Products User Configuration Guide
SQL injection is a technique often used to attack databases through a website. SQL injection attack a website
through WWW normal port and it seems like the common webpage, firewall device cannot alarm for the SQL
injection and if an administrator does not view the IIS log, SQL injection for a long time will not detected, so that the
SQL injection protection is especially important.
To enter the SQL injection protection interface, you can choose Service > Access control > SQL injection
protection, as shown in Figure7-18.
Item Description
Action Select an action for the rule, including warning and block
Operation
Click the copy icon to copy an entry of the SQL injection protection rule.
Click the delete icon to delete an entry of the SQL injection protection rule.
Chapter 8 VPN
A virtual private network (VPN) is a private network that interconnects remote (and often geographically separate)
networks through primarily public communication infrastructures such as the Internet. VPNs provide security
through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to
securely connect the branch offices of an organization to a head office network through the public Internet.
IPSec
8-214
DPtech FW1000 Series Firewall Products User Configuration Guide
L2TP
PPTP
GRE
SMAD
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by
authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for
establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic
keys to be used during the session.
To enter the IPsec sysConfig interface, you can choose Service > VPN > IPSec > IPSec sysConfig, as shown in
Figure8-1.
Item Description
8-215
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Table8-2 describes the configuration items of the IPSec VPN client access mode and gateway-gateway mode.
Item Description
Connection Name Bind Interface Displays the name of the IPSec rule.
Advanced Configuration
Local IP Address Displays the local IP address for the IPSec rule.
Remote IP address Displays the remote IP address for the IPSec rule.
Local Device ID Auto:(The system auto-select the local IP address as the local device ID)
Host Name:(Required when NAT traverse is configured)
IP Address:(Manually input any IP address on the local device as the local ID)
Local Certificate ID Alias:(Required when it is required to strictly check the
validity of the remote certification ID alias)
Remote device ID Auto:(The system auto-select the local IP address as the local device ID)
Host Name:(Required when NAT traverse is configured)
IP Address:(Manually input any IP address on the local device as the local ID)
Local Certificate ID Alias:(Required when it is required to strictly check the
validity of the remote certification ID alias)
Subnets Available to the clients List The Encryption Protection Subnets To The Clients
Authentication Mode There are four kinds of authentication method provided for you, including
Pre-shared key:
Digital Certificate: usercert.cer(Select the local certificate for certificate
authentication)
Xauth Authentication
Assign private IP address for clients
8-216
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Advanced configuration
Click the pencil icon that you can enter the advanced configuration interface,
including
Negotiation mode
IPSec Encryption Failed Action
IPSec Security Protocol
IKE Security Proposal
IPSec Security Proposal
Operation
Click the copy icon that you can copy an entry of the IPSec rule.
Click the delete icon that you can delete an entry of the IPSec rule.
To configure IPSec VPN client access mode, you can take the following steps:
8-217
DPtech FW1000 Series Firewall Products User Configuration Guide
Configure remote device ID and then from the four options you should select the obtaining method as your
requirement example: auto
Configure an IP segment for the source IP address packet, example: 1.1.1.0\24, configure an IP segment for the
destination IP address packet, example: 2.2.2.0\24
Configure authentication method and then from the two options you should select an authentication as your
requirement example: pre-shared key 1234.
After you finished the above steps, click Ok button in the upper right corner on the webpage.
To enter the IPsec policy mode interface, you can choose Service > VPN > IPSec > IPSec policy mode, as shown
in Figure8-2.
To enter the IPsec policy mode interface, you can choose Service > VPN > IPsec > IPsec policy mode, as shown in
Figure8-3.
8-218
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the Net protect interface, you can choose Service > VPN > IPsec > Net protect, as shown in Figure8-4.
8.1.6 SA
To enter the SA interface, you can choose Service > VPN > IPsec > SA, as shown in Figure8-5.
Figure8-5 SA
To enter the IPsec interface, you can choose Service > VPN > IPsec > IPsec interface, as shown in Figure8-6.
8.2 L2TP
L2TP is a standard Internet tunnel protocol similar to the PPTP protocol, and both of them can encrypt network on
the network stream. But the difference is that PPTP required to be IP network and L2TP is the peer-to-peer
connection facing to data packet; PPTP is to use a single tunnel whereas L2TP is to use multi tunnel; And the L2TP
provides the packet header compressing, tunnel verification, and vice versa, the it cannot supported by PPTP.
8-219
DPtech FW1000 Series Firewall Products User Configuration Guide
8.2.2 L2TP
To enter the L2TP configuration interface, you can click Service > VPN > L2TP, as shown in Figure8-7.
Item Description
PPP authentication mode Select an option from PPP authentication mode drop-down list, such as CHAP, PAP,
MSCHAP, and MSCHAPV2.
Client IP address range Configure the client IP address range and from the address pool to allocate local tunnel IP
address.
Advanced configuration
Click the modify icon that you can configure the advanced configuration of the LNS
rule,
Operation
Click the delete icon that you can delete an entry of the LNS rule.
Item Description
8-220
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
To enter the L2TP configuration interface, you can click Service > VPN > L2TP, as shown in Figure8-8.
To enter the L2TP IP pool interface, you can click Service > VPN > L2TP IP pool, as shown in Figure8-8.
8-221
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the L2TP online status interface, you can click Service > VPN > L2TP online status, as shown in
Figure8-10.
8.3 PPTP
Point to Point Tunneling Protocol (PPTP) is a kind of technology support multiple protocol VPN, working at layer
2.
To enter the L2TP configuration interface, you can click Service > VPN > PPTP, as shown in Figure8-11.
Figure8-11 PPTP
Item Description
Client IP address range Configure the start IP address of the IP address pool and configure a size of the IP address
pool.
Operation
Click the delete icon that you can delete PNS configuration.
Item Description
Operation
Click the copy icon that you can copy an entry of the user information configuration.
Click the delete icon that you can delete an entry of the user information
configuration.
8.4 GRE
Generic Routing Encapsulation (GRE) is a protocol designed for encapsulating and carrying the packets of one
network layer protocol (for example, IP or IPX) over another network layer protocol (for example, IP). GRE is a
tunneling technology and serves as a Layer 3 tunneling protocol. A GRE tunnel is a virtual point-to-point
connection for transferring encapsulated packets.
To enter the GRE configuration interface, you can click Service > VPN > GRE, as shown in Figure8-12.
8-223
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Tunnel interface NO Configure the GRE tunnel interface number (the number is from 1 to 64).
Tunnel source interface/IP address Displays GRE tunnel source interface IP address, select tunnel interface or the
corresponding IP address.
Advanced configuration Configure the advanced configuration, including MTU discovery and checksum
checkout and tunnel key.
Operation
Click the copy icon that you can copy an entry of the GRE rule.
Click the delete icon that you can delete an entry of the GRE rule.
To configure the GRE VPN rule, you can take the following steps:
8-224
DPtech FW1000 Series Firewall Products User Configuration Guide
8.5 SMAD
8.5.1 SMAD
To enter the SMAD interface, you can click Service > VPN > SMAD, as shown in Figure8-13.
Figure8-13 SMAD
To enter the SMAD blacklist interface, you can click Service > VPN > SMAD blacklist, as shown in Figure8-14.
To enter the SMAD log interface, you can click Service > VPN > SMAD log, as shown in Figure8-15.
8-225
DPtech FW1000 Series Firewall Products User Configuration Guide
SSL VPN is the most simple and the safest technology to resolve remote user access sensitive company data.
Compare with the complicated IPsec VPN, SSL VPN use the simple method to realize remote connection. Every
computer with browser can use SSL VPN software, for the reason of SSL VPN embedded into the browser, which
don’t need you to set up client software on every host like traditional IPsec VPN.
To enter the basic configuration interface, you can choose Service > VPN > SSL VPN, as shown in Figure8-16.
Item Description
Enable SSL VPN server Select a digital certificate for the server
8-226
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the IP pool configuration interface, you can choose Service > VPN > SSL VPN > IP pool configuration,
as shown in Figure8-17.
To enter the domain configuration interface, you can choose Service > VPN > SSL VPN > Domain configuration,
as shown in Figure8-18.
To enter the license management interface, you can choose Service > VPN > SSL VPN > License management, as
shown in Figure8-19.
To enter the portals management interface, you can choose Service > VPN > SSL VPN > Portals management, as
shown in Figure8-20.
8-227
DPtech FW1000 Series Firewall Products User Configuration Guide
8.6.3 Resources
To enter the resources interface and configure the IP resource configuration, you can choose Service > VPN > SSL
VPN > Resource, as shown in Figure8-21.
To enter the share space interface, you can choose Service > VPN > SSL VPN > Share space, as shown in
Figure8-22.
8-228
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the share space interface, you can choose Service > VPN > SSL VPN > Share space, as shown in
Figure8-23.
To enter the user status interface, you can choose Service > VPN > SSL VPN > User status, as shown in
Figure8-24.
To enter the authentication key interface, you can choose Service > VPN > SSL VPN > Authentication key, as
shown in Figure8-25.
8-229
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the security set interface, you can choose Service > VPN > SSL VPN > Security set, as shown in
Figure8-26.
To enter the security rule interface, you can choose Service > VPN > SSL VPN > Security rule, as shown in
Figure8-27.
To enter the security rule group interface, you can choose Service > VPN > SSL VPN > Security rule group , as
shown in Figure8-28.
To enter the policy configuration interface, you can choose Service > VPN > SSL VPN > Policy configuration, as
shown in Figure8-29.
8-230
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the log query interface, you can choose Service > VPN > SSL VPN > Log query, as shown in Figure8-30.
To enter the log configuration interface, you can choose Service > VPN > SSL VPN > Log configuration, as
shown in Figure8-31.
To enter the log manage interface, you can choose Service > VPN > SSL VPN > Log manage, as shown in
Figure8-32.
8-231
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the user stat form interface, you can choose Service > VPN > SSL VPN > User stat form, as shown in
Figure8-33.
To enter the flux stat form interface, you can choose Service > VPN > SSL VPN > Flux stat form, as shown in
Figure8-34.
To enter the statistical offline users interface, you can choose Service > VPN > SSL VPN > Statistical offline
users, as shown in Figure8-35.
To enter the online time ranking form interface, you can choose Service > VPN > SSL VPN > Online time
ranking form, as shown in Figure8-36.
8-232
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the resource access form interface, you can choose Service > VPN > SSL VPN > Resource access form,
as shown in Figure8-37.
9-233
DPtech FW1000 Series Firewall Products User Configuration Guide
Traffic analysis
Behavior analysis
Keyword filtering
To view the online behavior management menu, you can choose Service > Behavior > Traffic analysis, as shown
in Figure9-1.
To enter the traffic analysis interface, you can choose Service > Behavior > Traffic analysis, as shown in
Figure9-2.
9-234
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Interface traffic statistics Enable whether to enable the interface traffic statistic.
Traffic statistics per IP address Select whether to enable the traffic statistics per IP address function, and configure the
sending interval and network user group.
To enter the policy configuration interface, you can choose Service > Behavior > Behavior analysis > Policy
configuration, as shown in Figure9-3.
Item Description
User/User group Select an user or an user group for the behavior analysis policy
Operation
Click the copy icon to copy a behavior analysis rule.
9-235
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the policy configuration interface, you can choose Service > Behavior > Behavior analysis > Advanced
configuration, as shown in Figure9-4.
To enter the keyword filtering interface, you can choose Service > Behavior > Keyword filtering, as shown in
Figure9-5.
9-236
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Action Select an action for the keyword filtering rule, including warning or block.
Operation
Click the copy icon that you can copy an entry of the keyword filtering rule.
Click the delete icon that you delete an entry of the keyword filtering rule.
To create a keyword filtering rule, you can take the following steps:
To enter the keyword filtering interface, you can choose Service > Behavior > Keyword filtering, as shown in
Figure9-5.
9-237
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Action Select an action for the keyword filtering rule, including warning or block.
Operation
Click copy icon that you can copy an entry of the keyword filtering rule.
Click delete icon that you delete an entry of the keyword filtering rule.
To create a keyword filtering rule, you can take the following steps:
9-238
DPtech FW1000 Series Firewall Products User Configuration Guide
Portal authentication provides several authentication mechanisms, which allows user to authenticate their user name
and password before access to the Internet.
Authentication Config
Web Auth Notice
Behavior Listen
Proscenium Management
Terminal Management
Online User
Local User
To view the user authentication menu, you can choose Service > User authentication, as shown in Figure10-1.
To enter the user authentication interface, you can choose Service > User authentication > Basic authentication,
as shown in Figure10-2.
10-239
DPtech FW1000 Series Firewall Products User Configuration Guide
Item description
Unique authentication Allows you to select whether to enable unique authentication function.
User aging time Allows you to set the user aging time.
Quick offline Allows you to select whether to enable quick offline function.
To enter the webauth configuration interface, you can choose Service > User authentication > Webauth
configuration, as shown in Figure10-3.
10-240
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
NAT traverse configuration Allows you to configure the NAT traverse configuration, including authenticated protocol
configuration, authentication policy configuration.
Login state Allows you to select whether to show the login state window.
Notice Allows you to select no notice, web auth notice and URL address option for web authentication.
Enable proxy authentication Allows you to use proxy server to authenticate web users and allows you to configure the proxy
server IP address.
Using USB key Allows you to enable usbkey authentication function (Require importing certificate and
corresponding CA reboot are required, to take effect).
Temporary user login Allows you to enable temporary user login function.
Login interface image Allows you to select the login interface image.
Get MAC Allows you to enable the get MAC function and then you can get MAC from SNMP.
10-241
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the TAC configuration interface, you can choose Service > User authentication > Webauth
configuration > TAC configuration, as shown in Figure10-4.
Item Description
Client download URL Type client download URL for the TAC configuration
To enter customer configuration interface, you can choose Service > User authentication > Webauth
configuration > Customer configuration, as shown in Figure10-5.
10-242
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Login page Select an option that the login page will skip to the specific page
Default
Upload the return page
URL address (http://www.baidu.com)
Customize web authentication Allows you to customize the web authentication interface.
interface
To enter the web authentication notice interface, you can choose Service > User authentication > Web
authentication notice, as shown in Figure10-6.
10-243
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Serial number Displays the sequence number of the web auth notice.
Operation
Click the copy icon that you can copy an entry of the notice.
Click the delete icon that you can delete an entry of the notice.
If the web authentication function isn’t enabled, you can enable the web listen function for user authentication.
To enter the web listen interface, you can choose Service > User authentication > Web listen, as shown in
Figure10-7.
To enter the proscenium management interface, you can choose Service > User authentication > Portal
authentication, as shown in Figure10-8.
10-244
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Access address of proscenium Configure the device bridge interface IP address or WAN interface address.
Email address (addressee) Configure the e-mail address of the mail receiver(addressee)
Operation
You can copy or delete the proscenium administrator configuration by click the copy icon
or delete icon. Click the e-mail icon that you can send e-mail to the specific proscenium
administrator.
To configure the proscenium management configuration, you can take the following steps:
After you configured the proscenium configuration, click the email button that proscenium administrator can
receive an email which contains the user name, password and URL. When you log into the online management
interface, you can create user information, as shown in Figure10-9.
Table10-7 describes the configuration items of the hotel user online management.
Item Description
10-245
DPtech FW1000 Series Firewall Products User Configuration Guide
To configure the hotel user online management, you can take the following steps:
To enter the Microsoft update interface, you can choose Service > User authentication > Portal authentication >
Terminal > Microsoft update, as shown in Figure10-10.
Item Description
Remind management Click the Enable option that you can enable the remind management function.
Click the Disable option that you can disable the remind management function.
10-246
DPtech FW1000 Series Firewall Products User Configuration Guide
Remind install Configure the remind install, including not install, forcible install and remind install.
To enter the USB leakage monitor interface, you can choose Service > User authentication > Portal
authentication > Terminal > USB data leakage monitor, as shown in Figure10-11.
Table10-9 describes the configuration items of the USB data leakage monitor.
Item Description
USB data leakage monitor Click the Enable option that you can enable the USB data leakage monitor function.
Click the Disable option that you can disable the USB data leakage monitor function.
USB log audit Allows you to query or export the USB data monitor audit log.
To enter the terminal configuration interface, you can choose Service > User authentication > Portal
authentication > Terminal > Terminal configuration, as shown in Figure10-12.
10-247
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Operation
Click the copy icon that you can copy an entry of the terminal configuration.
Click the delete icon that you can delete an entry of the terminal configuration.
After the user is authenticated, the user’s authentication information will be displayed on the online user interface.
To enter the online user interface, you can choose Service > User authentication > Portal authentication >
Online user, as shown in Figure10-13.
Item Description
Enter net time Displays the time when the authentication user is online
Operation Click the icon that you can log out an administrator forcibly on the online user page.
10-248
DPtech FW1000 Series Firewall Products User Configuration Guide
Local account authentication user is mainly to authenticate and manage local user.
To enter the local authentication user interface, you can choose Service > User authentication > Portal > Local
authentication user, as shown in Figure10-14.
Item Description
Repeat password Configure the confirm password for the local authentication user.
User account group Select user account group for the local authentication user.
Real name group Select real name group for the local authentication user.
Status Select the Normal status or Locked status for the local authentication user.
Operation
Click copy icon that you can an entry of the local authentication user.
Click delete icon that you can delete an entry of the local authentication user.
10-249
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the blackname interface, you can choose Service > User authentication > Portal > Local authentication
user, as shown in Figure10-15.
Remote synchronization allows you to synchronize the local user authentication information with a remote host with
Unified Management Center software.
To enter the remote synchronization interface, you can choose Service > User authentication > Portal > Remote
synchronization, as shown in Figure10-16.
10-250
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Configure the IP address of UMC server, example: 10.58.241.234 port number: 9502
Select a remote user need to be synchronized, click Ok button.
If you want to search one of users, enter username in in the search bar, and click Search button.
10-251
DPtech FW1000 Series Firewall Products User Configuration Guide
11.1 Introduction
Firewall device added up with IDS cooperation function in order to cooperate with IDS device. IDS device can
detect network traffic if attacks exist and sent SNMIP Trap information to the firewall device with blocking
information, including source IP address and destination IP address of the packets. When IDS cooperation function
enabled, the firewall receives SNMP Trap information and generates blocked entry for the follow-up traffic.
To enter the display IDS cooperation log interface, you can choose Service > IDS integration > Display IDS
cooperation log, as shown in Figure11-1.
Table11-1 describes the configuration items of the display IDS integration log.
Item Description
Serial number Displays the serial number of the IDS integration log.
Valid time (Second) Displays the valid time of the IDS integration.
Operation
Click copy icon to copy an entry of the IDS integration log.
11-252
DPtech FW1000 Series Firewall Products User Configuration Guide
12.1 VRRP
VRRP
Hot standby
Interface synchronization group
To enter the VRRP interface, you can choose Service > High availability > VRRP, as shown in Figure12-1.
During data communication process, software and hardware error may result network disconnection, causing data
transmission failure. To avoid data communication disconnected, DPtech FW has provides Virtual Router
Redundancy Protocol (VRRP) technology using back up solution when communication line or device failure, so
that it ensure data communication smoothly and enhance network robustness and availability.
Enhancing local network and outside network connection availability, VRRP is fit for the local area network
which support multicast and broadcast (such as Ethernet). Through many devices forming a back up group, they
have an exit gateway for the local network and they are all transparent inside the local network. In the back up group,
if an FW device failure, it will be substituted by other device. So that the local host can still work without any
modification, greatly enhance network communication availability.
To enter the high availability interface, you can choose Service > High availability > VRRP, as shown in
Figure12-2.
12-253
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
VRID Virtual router identification. A virtual router consists of a group of routers with same
VRID.
Virtual IP Virtual IP address: virtual router IP address. A virtual router has one or
several IP addresses.
Authentication mode Allows you to select an authentication method, including None, simple text and MD5.
None authentication: No authentication is performed for any VRRP packet, without
security guarantee.
Simple text authentication: You can adopt the simple text authentication mode in a
network facing possible security problems. A router sending a VRRP packet fills an
authentication key into the packet, and the router receiving the packet compares its
local authentication key with that of the received packet. If the two authentication
keys are the same, the received VRRP packet is considered valid; otherwise, the
received packet is considered an invalid one.
MD5 authentication: You can adopt MD5 authentication in a network facing severe
security problems. The router encrypts a VRRP packet to be sent using the
authentication key and MD5 algorithm and saves the encrypted packet in the
authentication header. The router receiving the packet uses the authentication key
to decrypt the packet and checks whether the validity of the packet.
12-254
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
2.Configure tracking interface:
3. Configure monitor IP:
Operation
Click Add button or the delete button that you can add or delete an entry of the
VRRP configuration.
To configure the VRRP configuration, you can take the following steps:
Configure a number for the back up group ID number, the range is from 0 to 255, example: 1
Configure virtual IP address for the back up group, example: 2.2.2.1
Select backup group interface, example: eth0_7
Select an authentication method including none, text, and MD5
In the advanced configuration column, configure master elect priority, announce packet sending interval,
master preempt mode, and master preempt delay configuration, example: master elect priority 20,
announcement packet interval:1s, master preempt mode: preempt, master preempt delay: 0s
After you finished the above steps, click Confirm button in the upper right corner on the webpage.
Note:
Backup group ID number must be same in the same backup group.
Click delete icon that you can delete an entry of the VRRP configuration.
Click copy icon that you can copy an entry of the VRRP configuration.
To enter the monitor IP address object interface, you can choose Service > High availability > VRRP, as shown in
Figure12-3.
Figure12-3 Monitoring
12-255
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
12.1.3 Monitoring
To enter the monitoring interface, you can choose Service > High availability > Monitoring, as shown in
Figure12-4.
Figure12-4 Monitoring
To protect key applications, a network is usually designed with redundant backup links. Devices need to quickly
detect communication failures and restore communication through backup links as soon as possible. On some links,
such as POS links, devices detect link failures by sending hardware detection signals. However, some other links,
such as Ethernet links, provide no hardware detection mechanism. In that case, devices can use the hello mechanism
of a protocol for failure detection, which has a failure detection rate of more than one second. Such a rate is too slow
for some applications. Some routing protocols, such as OSPF and IS-IS, provide a fast hello mechanism for failure
detection, but this mechanism has a failure detection rate of at least one second and is protocol-dependent.
To enter the BFD option interface, you can choose Service > High availability >VRRP >BFD option, as shown in
the Figure12-5.
12-256
DPtech FW1000 Series Firewall Products User Configuration Guide
12.2 Overflow
To enter the overflow protect interface, you can choose Service > High availability >Overflow protect, as shown
in the Figure12-7.
Hot stand function is the basic software constructs high availability system, for any reason result in system failure
and service disconnection will trigger software process to predicate and isolate the failure and execute disconnected
services online. During this process, user only suffers a certain time delay and recovers services in the shortest time.
To enter the hot standby configuration interface, you can choose Service > High availability >Hot standby, as
shown in the Figure12-7.
12-257
DPtech FW1000 Series Firewall Products User Configuration Guide
Item Description
Hot standby configuration Hot standby configuration. There are four option allows you to choose, including disable
hot standby, common hot standby, advanced hot standby, advanced hot standby,
dissymmetrical hot standby, silence hot standby.
Hot standby mode There are two kinds of hot standby mode:
Double host
Host standby
To enter the handwork synchronization interface, you can choose Service > High availability > Handwork
synchronization, as shown in the Figure12-8Figure12-10.
To enter the backup reboot interface, you can choose Service > High availability > Backup reboot, as shown in
the Figure12-9.
12-258
DPtech FW1000 Series Firewall Products User Configuration Guide
To enter the interface synchronization group interface, you can choose Service > High availability > Interface
synchronization group, as shown in the Figure12-10.
Item Description
Operation
Click copy icon to copy an entry of the interface synchronization group.
12-259