background image

 

D-Link Nordic Technical Support 

 

1

 

 

 

 

DFL-M510 FAQ 

 
 

Summary of Contents for DFL-M510

Page 1: ...D Link Nordic Technical Support 1 DFL M510 FAQ...

Page 2: ...tween Bypass Mode and Bypass feature DMZ Hosts Q How to implement the DFL M510 in the environment with L3 device Q On which occasions should I use the DMZ bypass or Host bypass Why Q How does the DFL...

Page 3: ...ication Q Does Web Content keyword block ASCII code content How does it work Q What is the limitation to detect and block Skype Q How does Web Download work Are there any constraints Q Does Web Mail p...

Page 4: ...ce and Java GUl could be quite bandwidth consumptive especially in signature download or firmware upgrade the GUI communication possibly affects the upstream bandwidth and introduce more latency to ou...

Page 5: ...not support the WINS services The host is enabled with the firewall embedded within Microsoft Windows platform and the firewall blocks the WINS service The WINS service is disabled by user The host n...

Page 6: ...ic Technical Support 6 Q What would happen after the concurrent session exceeds 12K A Dropped or forwarded immediately This is optional by setting the configuration forward or block flag in Setup Host...

Page 7: ...he DMZ bypass or Host bypass Why A The DMZ is a trust area so that we do not have to check the traffic from this area and the high throughput is desired The same idea is also applied for hosts A netwo...

Page 8: ...ffect this A In Login process the Ul by Java applet reads several data and system configurations from the device and these suffer the login process They include Network setting DMZ list Bypassed hosts...

Page 9: ...s hosts can belong to multiple groups But the policy will be different The policy will depend on group priority Q Why can the template only be applied to a pre defined group Why can it not be applied...

Page 10: ...p Wizard again Q Why does the Win Pop up message fail A The Windows Pop up messages are delivered through UDP packets and this service has low priority in Windows system As the testing result shows Wi...

Page 11: ...or the device is too busy to send the real time data Scenario 2 the time axis of the RTM does no go as time elapses The RTM crashes because some unexpected error has happened User may need to close t...

Page 12: ...llows the administrator to query from seven types of Top N list and or to further investigate another Top N list based on a selected result of the first Top N query For example the administrator has t...

Page 13: ...Mesh KCeasy Kiwi Alpha For more information about P2P applications employing Gnutella network please refer to below links http en wikipedia org wiki Gnutella http www slyck com gnutella php pacje 2 Fa...

Page 14: ...rk please refer to below Iinks http Ilwww slyck comldc php pacje 2 Ku ro Kuro Pigo Pigo Note applications marked with have been tested with DF M510 device Other applications listed above though not of...

Page 15: ...anagement client and saved to the device The device will filter out the packets with the matching byte sequence For example if the user runs the management client on a PC and its default character set...

Page 16: ...ets DF M510 to block Skype after an internal user has logged into Skype network and the user never logs off 2 A user first logs in to Skype network with his her computer at one place does not log off...

Page 17: ...ser sends an HTTP GET request to the web server At the same time the file name to be downloaded and the file location are also sent with the HTTP GET request By identifying HTTP GET request and the fi...

Page 18: ...D Link Nordic Technical Support 18...

Page 19: ...ications by identifying signatures of Streaming Media Applications Q Why can the DFL M510 only block or allow Skype QQ Is there no granular action control A After a user logs into Skype or QQ all the...

Page 20: ...PC Overflow Sasser 2 WORM Windows Lsasrv dII RPC Overflow Sasser 1 3 WORM Windows Lsasrv dII RPC Overflow Unicode Sasser 4 WORM Windows Lsasrv dII RPC Overflow Unicode Sasser 1 5 WORM HTTP IIS CodeRed...

Page 21: ...N active BackConstruction 2 1 ftp open reply 20 TROJAN dagger_1 4 0_client_connect 21 TROJAN active netbus 12346 22 TROJAN worm QAZ calling home 23 TROJAN BackOrificel scan 24 TROJAN trojan hOrtiga 25...

Page 22: ...roat 3 1 Server Response 3150 Q What happens after DFL M510 blocks detects malicious traffic A By Layer 7 detection engine DFL M510 will drop the corresponding packet which is classified as a maliciou...

Reviews: