Available 15 files for D-Link DFL-1600 Revision A
Select Files
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise WAN Setup using Static IP
Information
Manual
Operating System
Manual
Size Driver
221KB
File Name
dfl-800_1600_2500-wan_with_static_ip.pdf
Observations
WAN with static IP
Click “address book” under “Object
Add an object for IP4 Host/Network
Verify the IP addresses of wan1_ip and wan1net
Click “Ethernet” under “Interfaces”
Add the gateway object for “Default Gateway”
Click “IP rules” under “Rules”
Choose the correct Action,Service,Interface and Network for the rule
Click “Save and Active”
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise User's Manual v1.08
Information
Manual
Operating System
Manual
Size Driver
6.6MB
File Name
dfl_firewall_usermanual_v1.08.pdf
Observations
Preface ...............................................................................................................12
1. NetDefendOS Overview ....................................................................................14
1.1. Features ................................................................................................14
1.2. NetDefendOS Architecture ......................................................................17
1.2.1. State-based Architecture ...............................................................17
1.2.2. NetDefendOS Building Blocks .......................................................17
1.2.3. Basic Packet Flow ........................................................................18
1.3. NetDefendOS State Engine Packet Flow .....................................................20
2. Management and Maintenance ............................................................................25
2.1. Managing NetDefendOS ..........................................................................25
2.1.1. Overview ...................................................................................25
2.1.2. The Default Administrator Account .................................................26
2.1.3. The Web Interface .......................................................................26
2.1.4. The CLI .....................................................................................30
2.1.5. CLI Scripts .................................................................................36
2.1.6. Secure Copy ...............................................................................39
2.1.7. The Console Boot Menu ...............................................................41
2.1.8. Management Advanced Settings .....................................................43
2.1.9. Working with Configurations .........................................................44
2.2. Events and Logging ................................................................................49
2.2.1. Overview ...................................................................................49
2.2.2. Event Messages ...........................................................................49
2.2.3. Event Message Distribution ...........................................................49
2.2.4. Advanced Log Settings .................................................................52
2.3. RADIUS Accounting ..............................................................................54
2.3.1. Overview ...................................................................................54
2.3.2. RADIUS Accounting Messages ......................................................54
2.3.3. Interim Accounting Messages ........................................................56
2.3.4. Activating RADIUS Accounting .....................................................56
2.3.5. RADIUS Accounting Security ........................................................56
2.3.6. RADIUS Accounting and High Availability ......................................56
2.3.7. Handling Unresponsive Servers ......................................................57
2.3.8. Accounting and System Shutdowns .................................................57
2.3.9. Limitations with NAT ...................................................................57
2.3.10. RADIUS Advanced Settings ........................................................57
2.4. SNMP Monitoring ..................................................................................59
2.4.1. SNMP Advanced Settings .............................................................60
2.5. The pcapdump Command ........................................................................62
2.6. Maintenance ..........................................................................................65
2.6.1. Auto-Update Mechanism ...............................................................65
2.6.2. Creating Backup Files ...................................................................65
2.6.3. Configuration Backup and Restore ..................................................66
2.6.4. Restore to Factory Defaults ............................................................67
3. Fundamentals ...................................................................................................70
3.1. The Address Book ..................................................................................70
3.1.1. Overview ...................................................................................70
3.1.2. IP Addresses ...............................................................................70
3.1.3. Ethernet Addresses .......................................................................72
3.1.4. Address Groups ...........................................................................73
3.1.5. Auto-Generated Address Objects ....................................................73
3.1.6. Address Book Folders ...................................................................74
3.2. Services ................................................................................................75
3.2.1. Overview ...................................................................................75
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
Revision A NETDEFEND VPN Firewall 1600 Enterprise VPN Setup with Certification
Information
Manual
Operating System
Manual
Size Driver
2MB
File Name
dfl-800_1600_2500-vpnwithcertification.pdf
Observations
How to Connect to D-Link Firewalls Using VPN Client with
Certification (X.509) ?
This HOW TO document applies to :
Model : DFL-800/1600/2500
Firmware : 2.03 or above
This How To document is intended for providing users a clear guideline to configure
DFL series Firewalls with X.509 certification. In this document, we have used
Microsoft CA (Certification Authority) to generate client and gateway certificates.
Certification Services is a standard component in Windows 2000/2003 server.
Network diagram below provides a concise illustration for the system configuration.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
SoHo Network Security Firewall Datasheet
Information
Manual
Operating System
Manual
Size Driver
167KB
File Name
dfl-800_1600_2500-how_to_configure_dns_relay.pdf
Observations
How to configure DNS Relay
This example describes about firewalls support to relay DNS query packets from LAN to
Internet for domain name resolving. All DFL firewalls (DFL-210/800/1600/2500) support
this feature from firmware v2.04 and later.
Note: About this feature, it performs relay/forward DNS packets only since D-Link DFL
firewalls don’t built-in DNS server in system kernel. Therefore, it can not instead of real
DNS server to provide domain name resolving and related functionality.
Details:
- LAN IP on firewall: 192.168.1.1 (with the function of DNS relay)
- Lannet on firewall: 192.168.1.0/24
- DNS Server on Internet: 12.0.0.1
1. Addresses
Go to Objects -> Address book -> InterfaceAddresses
Create an IP Address called dns_server with address 12.0.0.1
Click Ok.
2. Create IP Rules to redirect DNS packets to Internet
Go to Rules -> IP Rules
Create a new IP Rule with SAT action.
In the General tab:
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
SoHo Network Security Firewall Diagram
Information
Manual
Operating System
Manual
Size Driver
1.2MB
File Name
dfl-800_1600_2500-portforwarding_smtp.pdf
Observations
Log into the DFL-800 web management and select the 'IP Rules' menu.
Create a new IP Rule Folder by clicking on the 'Add' button and selecting 'IP Rule Folder'.
Give the folder a meaningful name.
(you will not yet have any rules in your new folder )
Click on the newly created folder and create a new rule by clicking on the 'Add' button and selecting
'IP Rule'.
On the 'General' tab, enter a name of your choice into the 'Name' field.
Select 'SAT' from the 'Action' drop down menu.
Select 'SMTP-IN' from the 'Service' drop down menu.
Change the 'Schedule' option as needed (Selecting 'None' will ensure this rule is always applicable)
Under the 'Address Filter' section select the following options as in the screen shot below:
Source Interface: WAN 1
Source Network: all-nets
Destination Interface: core
Destination Network: wan1_ip (the address of the DFL-800's WAN interface)
Click on the 'SAT' tab.
Select 'Destination IP Address'
In the 'New IP Address:' box enter the name of your SMTP-server
(this should have been created previously in the 'Address Book' under the 'Objects' menu)
Click on 'OK'
Create a new rule by clicking on the 'Add' button and selecting 'IP Rule'.
On the 'General' tab, enter a name of your choice into the 'Name' field.
Select 'Allow' from the 'Action' drop down menu.
Select 'SMTP-IN' from the 'Service' drop down menu.
Change the 'Schedule' option as needed (Selecting 'None' will ensure this rule is always applicable)
Under the 'Address Filter' section select the following options as in the screen shot below:
Source Interface: wan 1
Source Network: all-nets
Destination Interface: core
Destination Network: wan1_ip (the address of the DFL-800's WAN interface)
Click on 'OK'.
You should now have two rules in your folder as in the screen shot below
Click on 'Configuration' menu item and select the 'Save and Activate' option.
After a short wait while the rules are applied, the Firewall should pass SMTP traffic through to your
SMTP server.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
SoHo Network Security Firewall IDS Pattern files
Information
Manual
Operating System
Manual
Size Driver
1.2MB
File Name
dfl-800_1600_2500-vpn_lan_to_multi_lan.pdf
Observations
Overview
In this document, the notation Objects->Address book means that in the tree on the left
side of the screen Objects first should be clicked (expanded) and then Address Book.
Most of the examples in this document are adapted for the DFL-800. The same settings can
easily be used for all other models in the series. The only difference is the names of the
interfaces. Since the DFL-1600 and DFL-2500 has more than one lan interface, the lan
interfaces are named lan1, lan2 and lan3 not just lan.
The screenshots in this document is from firmware version 2.04.00. If you are using a later
version of the firmware, the screenshots may not be identical to what you see on your
browser.
To prevent existing settings to interfere with the settings in these guides, reset the
firewall to factory defaults before starting.
Configure lan-to-lan tunnels between a main office and two
remote offices (sometimes called Hub and Spoke).
This guide shows how to configure tunnels between three firewalls. First create
one tunnel from firewall A to firewall B and then a second tunnel from firewall A
to firewall C. Users behind firewall B should be able to reach resources behind
firewall C (and the other way around).
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise Portmapping a public IP
Information
Manual
Operating System
Manual
Size Driver
164KB
File Name
dfl-800_1600_2500-portmapping_a_public_ip.pdf
Observations
Portmapping a public IP
How to forward a public IP to a server behind the firewall using virtual IP on the server.
Add the objects of both public and virtual IP addresses for FTP server.
*Click “Address Book” under Objects
• Click “ARP Table” under “Interfaces”
• Apply objects with the FTP IP address
Click “IP Rule” under “Rules”
• Choose the correct Action,Service,Interface,SAT setting and Network for the rule
Click “IP Rule” under “Rules”
• Choose the correct Action,Service,Interface and Network for the rule
fter all configuration , Click “configuration” in main bar
A
• Click “Save and Active”
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise Transparent mode
Information
Manual
Operating System
Manual
Size Driver
1MB
File Name
dfl-800_1600_2500-transparent_mode.pdf
Observations
Overview
In this document, the notation Objects->Address book means that in the tree on the left
side of the screen Objects first should be clicked (expanded) and then Address Book.
Most of the examples in this document are adapted for the DFL-800. The same settings can
easily be used for all other models in the series. The only difference is the names of the
interfaces. Since the DFL-1600 and DFL-2500 has more than one lan interface, the lan
interfaces are named lan1, lan2 and lan3 not just lan.
The screenshots in this document is from firmware version 2.04.00. If you are using a later
version of the firmware, the screenshots may not be identical to what you see on your
browser.
To prevent existing settings to interfere with the settings in these guides, reset the
firewall to factory defaults before starting.
How to configure transparent mode
This scenario shows how a firewall in Transparent Mode can be placed into an
existing network between an Internet access router and LAN, without the need
to reconfigure clients in LAN.
The WAN and LAN interfaces of the firewall will be configured to operate in Transparent
Mode. It is preferred to configure IP addresses on the WAN and LAN interfaces, as this can
improve performance during automatic discovering of hosts.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise CLI Reference Manual v1.03
Information
Manual
Operating System
Manual
Size Driver
1.1MB
File Name
dfl_cli_reference_guide_v1.03.pdf
Observations
Preface ................................................................................................................ 9
1. Introduction .....................................................................................................11
1.1. Running a command ...............................................................................11
1.2. Help ....................................................................................................12
1.2.1. Help for commands ......................................................................12
1.2.2. Help for object types ....................................................................12
1.3. Function keys ........................................................................................13
1.4. Command line history .............................................................................14
1.5. Tab completion ......................................................................................15
1.5.1. Inline help ..................................................................................15
1.5.2. Autocompleting Current and Default value .......................................15
1.5.3. Configuration object type categories ................................................16
1.6. User roles .............................................................................................17
2. Command Reference .........................................................................................19
2.1. Configuration ........................................................................................19
2.1.1. activate ......................................................................................19
2.1.2. add ............................................................................................19
2.1.3. cancel ........................................................................................20
2.1.4. cc .............................................................................................21
2.1.5. commit ......................................................................................22
2.1.6. delete ........................................................................................22
2.1.7. pskgen .......................................................................................23
2.1.8. reject .........................................................................................23
2.1.9. reset ..........................................................................................25
2.1.10. set ...........................................................................................25
2.1.11. show ........................................................................................26
2.1.12. undelete ...................................................................................28
2.2. Runtime ...............................................................................................30
2.2.1. about .........................................................................................30
2.2.2. alarm .........................................................................................30
2.2.3. arp ............................................................................................30
2.2.4. arpsnoop ....................................................................................31
2.2.5. ats .............................................................................................32
2.2.6. bigpond .....................................................................................32
2.2.7. blacklist .....................................................................................33
2.2.8. buffers .......................................................................................34
2.2.9. cam ...........................................................................................35
2.2.10. certcache ..................................................................................35
2.2.11. cfglog ......................................................................................35
2.2.12. connections ...............................................................................36
2.2.13. cpuid .......................................................................................36
2.2.14. crashdump ................................................................................37
2.2.15. dconsole ...................................................................................37
2.2.16. dhcp ........................................................................................38
2.2.17. dhcprelay ..................................................................................38
2.2.18. dhcpserver ................................................................................39
2.2.19. dns ..........................................................................................40
2.2.20. dnsbl .......................................................................................40
2.2.21. dynroute ...................................................................................41
2.2.22. frags ........................................................................................41
2.2.23. ha ............................................................................................42
2.2.24. hostmon ...................................................................................42
2.2.25. httpposter .................................................................................43
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise How to configure WAN load sharing and failover for two ISPs
Information
Manual
Operating System
Manual
Size Driver
426KB
File Name
dfl-800_1600_2500-how_to_configure_wan_load_sharing_and_failover_for_two_isps.pdf
Observations
Overview
In this document, the notation Objects->Address book means that in the tree on the left
side of the screen Objects first should be clicked (expanded) and then Address Book.
Most of the examples in this document are adapted for the DFL-800. The same settings can
easily be used for all other models in the series. The only difference is the names of the
interfaces. Since the DFL-1600 and DFL-2500 has more than one lan interface, the lan
interfaces are named lan1, lan2 and lan3 not just lan.
The screenshots in this document is from firmware version 2.11.02. If you are using an
earlier version of the firmware, the screenshots may not be identical to what you see on
your browser.
To prevent existing settings to interfere with the settings in these guides, reset the
firewall to factory defaults before starting.
How to configure WAN loading sharing and failover for two ISPs
using policy based routing
Details for this scenario:
- WAN1 is using dynamic IP with PPPoE
- WAN2 is using a static IP
- From LAN to WAN direction on WAN1 interface, HTTP, HTTPS and FTP services are
allowed to connect to Internet.
- From LAN to WAN direction on WAN2 interface, SMTP, POP3 and Ping services are
allowed to connect to Internet.
WAN1 and WAN2 interface serve for different Internet services at the same time;
meanwhile if any WAN circuit fails, all services will be redirected to the other WAN
interface. When the failed circuit returns to normal, these services will come back to
original WAN circuit.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise Log Reference Guide v1.03
Information
Manual
Operating System
Manual
Size Driver
2.3MB
File Name
dfl_log_reference_guide_v1.03.pdf
Observations
Preface ...............................................................................................................27
1. Introduction .....................................................................................................29
1.1. Log Message Structure ............................................................................29
1.2. Context Parameters .................................................................................31
1.3. Statistics (usage) ....................................................................................35
1.4. Severity levels .......................................................................................36
2. Log Message Reference .....................................................................................38
2.1. ALG ....................................................................................................39
2.1.1. alg_session_open (ID: 00200001) ...................................................39
2.1.2. alg_session_closed (ID: 00200002) .................................................40
2.1.3. max_line_length_exceeded (ID: 00200003) ......................................40
2.1.4. alg_session_allocation_failure (ID: 00200009) ..................................40
2.1.5. invalid_client_http_header_received (ID: 00200100) ..........................41
2.1.6. invalid_url_format (ID: 00200101) .................................................41
2.1.7. unknown_client_data_received (ID: 00200105) .................................41
2.1.8. suspicious_data_received (ID: 00200106) .........................................42
2.1.9. invalid_chunked_encoding (ID: 00200107) .......................................42
2.1.10. invalid_server_http_header_received (ID: 00200108) ........................43
2.1.11. compressed_data_received (ID: 00200109) .....................................43
2.1.12. max_http_sessions_reached (ID: 00200110) ....................................43
2.1.13. failed_create_new_session (ID: 00200111) .....................................44
2.1.14. failure_connect_http_server (ID: 00200112) ....................................44
2.1.15. content_type_mismatch (ID: 00200113) .........................................44
2.1.16. wcf_override_full (ID: 00200114) .................................................45
2.1.17. content_filtering_disabled (ID: 00200115) ......................................45
2.1.18. max_download_size_reached (ID: 00200116) ..................................45
2.1.19. blocked_filetype (ID: 00200117) ...................................................46
2.1.20. out_of_memory (ID: 00200118) ....................................................46
2.1.21. wcf_servers_unreachable (ID: 00200119) .......................................46
2.1.22. wcf_srv_connection_error (ID: 00200120) ......................................47
2.1.23. wcf_server_unreachable (ID: 00200121) ........................................47
2.1.24. wcf_connecting (ID: 00200122) ....................................................48
2.1.25. wcf_server_connected (ID: 00200123) ...........................................48
2.1.26. wcf_primary_fallback (ID: 00200124) ...........................................48
2.1.27. request_url (ID: 00200125) ..........................................................48
2.1.28. request_url (ID: 00200126) ..........................................................49
2.1.29. request_url (ID: 00200129) ..........................................................49
2.1.30. out_of_memory (ID: 00200130) ....................................................50
2.1.31. restricted_site_notice (ID: 00200132) ............................................50
2.1.32. url_reclassification_request (ID: 00200133) ....................................50
2.1.33. max_smtp_sessions_reached (ID: 00200150) ..................................51
2.1.34. maximum_email_per_minute_reached (ID: 00200151) ......................51
2.1.35. failed_create_new_session (ID: 00200152) .....................................52
2.1.36. failed_connect_smtp_server (ID: 00200153) ...................................52
2.1.37. invalid_server_response (ID: 00200155) .........................................52
2.1.38. sender_email_id_mismatched (ID: 00200157) .................................53
2.1.39. sender_email_id_is_in_blacklist (ID: 00200158) ..............................53
2.1.40. recipient_email_id_in_blacklist (ID: 00200159) ...............................53
2.1.41. some_recipient_email_ids_are_in_blocklist (ID: 00200160) ...............54
2.1.42. base64_decode_failed (ID: 00200164) ...........................................54
2.1.43. base64_decode_failed (ID: 00200165) ...........................................55
2.1.44. blocked_filetype (ID: 00200166) ...................................................55
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise VPN Setup LAN to LAN using PPTP/L2TP
Information
Manual
Operating System
Manual
Size Driver
1.1MB
File Name
dfl-800_1600_2500-vpn_using_a_pptp_l2tp_lan-to-lan_tunnel.pdf
Observations
Overview
In this document, the notation Objects->Address book means that in the tree on the left
side of the screen Objects first should be clicked (expanded) and then Address Book.
Most of the examples in this document are adapted for the DFL-800. The same settings can
easily be used for all other models in the series. The only difference is the names of the
interfaces. Since the DFL-1600 and DFL-2500 has more than one lan interface, the lan
interfaces are named lan1, lan2 and lan3 not just lan.
The screenshots in this document is from firmware version 2.04.00. If you are using a later
version of the firmware, the screenshots may not be identical to what you see on your
browser.
To prevent existing settings to interfere with the settings in these guides, reset the
firewall to factory defaults before starting.
Virtual private network using a PPTP (or L2TP) lan-tolan
tunnel
Crea
Fire
te one lan-to-lan PPTP VPN tunnel between firewall A and B.
wall B is the server and firewall A the client.
If a L2TP tunnel is going to be used, instead of PPTP, follow the steps
in this guide but change tunnel protocol from PPTP to L2TP in step 2 and 6. The other
settings are same in both cases.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
Integrated Firewall for SOHO Firmware
Information
Manual
Operating System
Manual
Size Driver
2.1MB
File Name
dfl-1600.pdf
Observations
D-Link’s NetDefend Firewall Series packs an
impressive set of features including high-speed
processors, extensive signature databases,
and the power to handle up to a million
concurrent sessions. Enclosed in an industrial
chassis, these firewalls include multiple
user-configurable interfaces, including highspeed
Gigabit ports for flexible, scalable and
bottleneck-free network deployment.
NetDefend makes use of component-based
signatures3 which are built to recognize
and protect against all varieties of known
and unknown attacks. The IPS system can
address all critical aspects of an attack or
potential attack including the payload, NO P
sled, infection, and any exploits. The IPS
database includes attack information and data
from a global attack sensor-grid and exploits
collected from public sites such as the National
Vulnerability Database and Bugtrax.
The D-Link constantly updates its Auto-
Signature Sensor System in order to deliver
high-quality, optimized, IPS signatures. Without
overloading existing security appliances, these
signatures ensure a high ratio of detection
accuracy and the lowest ratio of false positives3.
D-Link NetDefend firewalls can be remotely
managed via a web-based interface or through
a dedicated VPN connection. They include
flexible features to monitor and maintain a
healthy and secure network, such as e-mail
alerts, system log and real-time statistics.
To minimize the impact of any event on an
entire network, D-Link NetDefend firewalls
include a special feature called ZoneDefense
- a mechanism that operates seamlessly with
D-Link xStack switches to perform proactive
network security. ZoneDefense automatically
quarantines infected computers and prevents
them from flooding the network with malicious
traffic.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
Integrated Firewall for SOHO Firmware
Information
Manual
Operating System
Manual
Size Driver
269KB
File Name
dfl-800_1600_2500-how_to_configure_vlan.pdf
Observations
How to Configure VLAN
This example requires a DFL-1600 or 2500 to be fully implemented. Most settings can
however also be used on a DFL-210 or DFL-800.
Two tag based VLANs will be created on lan3, that connect to switch port with VLAN tag.
Details:
- From lan1, lan2 and lan3: HTTP, HTTPS and DNS connect to Internet via wan2.
- All internal nets can also access the Mail server in dmz.
- Only VLAN2 can access the FTP server in dmz.
1. Addresses
Go to Objects -> Address book -> InterfaceAddresses
Make sure the configured addresses match the following list, and add the objects that not
already exist. To add new objects, select IP address from the add dropdown, enter name and
address and click ok.
2. Ethernet interfaces
Go to Interfaces -> Ethernet.
Edit the wan1 interface to use the following settings.
Company
D-Link
Categories
Networks Cards
Model
D-Link DFL-1600 Revision A
Description
NETDEFEND VPN Firewall 1600 Enterprise Bandwidth Management
Information
Manual
Operating System
Manual
Size Driver
1.3MB
File Name
dfl-800_1600_2500-bandwidth_management.pdf
Observations
Overview
In this document, the notation Objects->Address book means that in the tree on the left
side of the screen Objects first should be clicked (expanded) and then Address Book.
Most of the examples in this document are adapted for the DFL-800. The same settings can
easily be used for all other models in the series. The only difference is the names of the
interfaces. Since the DFL-1600 and DFL-2500 has more than one lan interface, the lan
interfaces are named lan1, lan2 and lan3 not just lan.
The screenshots in this document is from firmware version 2.04.00. If you are using a later
version of the firmware, the screenshots may not be identical to what you see on your
browser.
To prevent existing settings to interfere with the settings in these guides, reset the
firewall to factory defaults before starting.
How to configure Bandwidth Management
Details for this scenario:
- The WAN1 and WAN2 are using static IP with different ISP xDSL circuits. Both
circuits bandwidth are 1Mbps (in this case, assume 1Mb=1000Kb).
- From LAN to WAN1 HTTP, HTTPS, POP3 and other services connect to
Internet.
- WAN1: For inbound and outbound HTTP and HTTPS, the maximum bandwidth is 500Kb.
- WAN1: For inbound and outbound POP3, the guaranteed bandwidth is 300Kb (maximum
bandwidth is 1000Kb).
- WAN1: For other inbound and outbound service, the maximum bandwidth is 200Kb.
- From LAN to WAN2 SMTP, FTP and VoIP services connect to Internet.
- WAN2: For inbound and outbound SMTP, the guaranteed bandwidth is 500Kb (the
maximum bandwidth is 1000Kb)
- WAN2: For inbound and outbound FTP, the maximum bandwidth is 250Kb.
- WAN2: For inbound and outbound VoIP, the guaranteed bandwidth is 250Kb.
Access to Official Website D-Link
Welcome to the HelpDrivers, driver for printers.
Original files: In HelpDrivers, all drivers, manuals, BIOS, etc. are those originally provided by the official manufacturers. Click here to learn more
You can download by either clicking the 'Download' button. From the File Download window, verify that "Save" is selected and click OK.
Do not rename the file you're downloading, it may cause installation problems.