background image

 

D-Link Nordic Technical Support 

 

10

 

there’re priorities among groups. For example, the CEO of the company can be in 

“Administrator” group and “Default” group in the same time. But he will only inherit the 
privilege of “Administrator” group due to its higher priority. But since there’re priorities 

among host groups, we don’t allow host-wise template operation because we cannot 
prioritize between the single host and a host group. Indeed it introduces a little 
inconvenience when applying a template to single host, but eventually the user benefits 

from the host group design 
 
 

Q: Why is the “Wizard_Template” created by Setup Wizard unable 

to be modified? 

 

A:

 This Template belongs to a pre-define template list, like the “Block all” Template. It 

cannot be modified/deleted. This Template is generated by System/Setup Wizard. If you 

want to modify it, please run 

System/Setup 

Wizard again. 

 

 

Q: Why does the ”Win Pop-up message” fail?  

A:

 The Windows Pop-up messages are delivered through UDP packets and this service 

has low priority in Windows system. As the testing result shows, Windows system 

possibly could receive the WinPop-up messages without showing them up. Moreover, If 
the personal firewall is enabled in the system, the WinPop-up message could be blocked 
by the firewall policies. ln addition, the WinPop-up service is able to be shutdown freely 

in the target system. 

  

 

 

Q: Can the DFL-M510 send Pop-up messages to clients in different

 

subnets under L3 switch? 

 

A:

 WinPop-up messages are delivered by the DFL-M510 through UDP stream directly to 

the target (i.e., not through the gateway, even the target is in the different subnet). So 

that if the device and the target are not in the same subnet, the Win pop-up messages 
will not reach to the target host.  

 
 

Q: Why are there only 9 keyword filters in the DFL-M510? 

 

A:

 We believe that nine filters are enough for normal situations. Performance issue is 

another design consideration in this case. 

Summary of Contents for DFL-M510

Page 1: ...D Link Nordic Technical Support 1 DFL M510 FAQ...

Page 2: ...tween Bypass Mode and Bypass feature DMZ Hosts Q How to implement the DFL M510 in the environment with L3 device Q On which occasions should I use the DMZ bypass or Host bypass Why Q How does the DFL...

Page 3: ...ication Q Does Web Content keyword block ASCII code content How does it work Q What is the limitation to detect and block Skype Q How does Web Download work Are there any constraints Q Does Web Mail p...

Page 4: ...ce and Java GUl could be quite bandwidth consumptive especially in signature download or firmware upgrade the GUI communication possibly affects the upstream bandwidth and introduce more latency to ou...

Page 5: ...not support the WINS services The host is enabled with the firewall embedded within Microsoft Windows platform and the firewall blocks the WINS service The WINS service is disabled by user The host n...

Page 6: ...ic Technical Support 6 Q What would happen after the concurrent session exceeds 12K A Dropped or forwarded immediately This is optional by setting the configuration forward or block flag in Setup Host...

Page 7: ...he DMZ bypass or Host bypass Why A The DMZ is a trust area so that we do not have to check the traffic from this area and the high throughput is desired The same idea is also applied for hosts A netwo...

Page 8: ...ffect this A In Login process the Ul by Java applet reads several data and system configurations from the device and these suffer the login process They include Network setting DMZ list Bypassed hosts...

Page 9: ...s hosts can belong to multiple groups But the policy will be different The policy will depend on group priority Q Why can the template only be applied to a pre defined group Why can it not be applied...

Page 10: ...p Wizard again Q Why does the Win Pop up message fail A The Windows Pop up messages are delivered through UDP packets and this service has low priority in Windows system As the testing result shows Wi...

Page 11: ...or the device is too busy to send the real time data Scenario 2 the time axis of the RTM does no go as time elapses The RTM crashes because some unexpected error has happened User may need to close t...

Page 12: ...llows the administrator to query from seven types of Top N list and or to further investigate another Top N list based on a selected result of the first Top N query For example the administrator has t...

Page 13: ...Mesh KCeasy Kiwi Alpha For more information about P2P applications employing Gnutella network please refer to below links http en wikipedia org wiki Gnutella http www slyck com gnutella php pacje 2 Fa...

Page 14: ...rk please refer to below Iinks http Ilwww slyck comldc php pacje 2 Ku ro Kuro Pigo Pigo Note applications marked with have been tested with DF M510 device Other applications listed above though not of...

Page 15: ...anagement client and saved to the device The device will filter out the packets with the matching byte sequence For example if the user runs the management client on a PC and its default character set...

Page 16: ...ets DF M510 to block Skype after an internal user has logged into Skype network and the user never logs off 2 A user first logs in to Skype network with his her computer at one place does not log off...

Page 17: ...ser sends an HTTP GET request to the web server At the same time the file name to be downloaded and the file location are also sent with the HTTP GET request By identifying HTTP GET request and the fi...

Page 18: ...D Link Nordic Technical Support 18...

Page 19: ...ications by identifying signatures of Streaming Media Applications Q Why can the DFL M510 only block or allow Skype QQ Is there no granular action control A After a user logs into Skype or QQ all the...

Page 20: ...PC Overflow Sasser 2 WORM Windows Lsasrv dII RPC Overflow Sasser 1 3 WORM Windows Lsasrv dII RPC Overflow Unicode Sasser 4 WORM Windows Lsasrv dII RPC Overflow Unicode Sasser 1 5 WORM HTTP IIS CodeRed...

Page 21: ...N active BackConstruction 2 1 ftp open reply 20 TROJAN dagger_1 4 0_client_connect 21 TROJAN active netbus 12346 22 TROJAN worm QAZ calling home 23 TROJAN BackOrificel scan 24 TROJAN trojan hOrtiga 25...

Page 22: ...roat 3 1 Server Response 3150 Q What happens after DFL M510 blocks detects malicious traffic A By Layer 7 detection engine DFL M510 will drop the corresponding packet which is classified as a maliciou...

Reviews: