
3.2. Services
3.2.1. Overview
A Service object is a reference to a specific IP protocol with associated parameters. A Service
definition is usually based on one of the major transport protocols such as TCP or UDP, with the
associated port number(s). The HTTP service, for instance, is defined as using the TCP protocol
with associated port 80.
However, service objects are not restricted to just TCP or UDP. They can be used to define ICMP
messages, as well as a user-definable IP protocol.
Services as Objects
Services are passive objects in that they cannot carry out any action in the system on their own.
Instead, Service objects are used frequently in the various security policies defined by rule sets. For
instance, a rule in the IP rule set can use a Service object as a filter to decide whether or not to allow
certain traffic through the D-Link Firewall. For more information on how service objects are being
used with IP rules, see Section 3.5, “The IP Rule Set”.
Pre-defined Services
A large number of Service objects come pre-defined with NetDefendOS. These include common
services such as HTTP, FTP, Telnet and SSH. Pre-defined Services can be used and also modified
just like user-defined Services. However, it is recommended NOT to make any changes to
pre-defined services, but instead create new ones with the desired parameters.
Example 3.6. Listing the Available Services
To produce a listing of the available services in the system:
CLI
gw-world:/> show Service
The output will look similar to the following listing:
ServiceGroup
Name
Comments
------------
--------------------------------------------------
all_services
All ICMP, TCP and UDP services
all_tcpudp
All TCP and UDP services
ipsec-suite
The IPsec+IKE suite
l2tp-ipsec
L2TP using IPsec for encryption and authentication
l2tp-raw
L2TP control and transport, unencrypted
pptp-suite
PPTP control and transport
ServiceICMP
...
Web Interface
1.
Go to Objects > Services
Example 3.7. Viewing a Specific Service
3.2. Services
Chapter 3. Fundamentals
75
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...