beautypg.com

Oftware, Eatures, 2 software features – D-Link DRO-210i User Manual

Page 9

background image

Product Overview

Dlink DRO-210i User Guide

9

1.2

Software Features


The router has rich features like routing, load-balancing, auto backup, firewall access
control, secure VPN connectivity, network address translation, quality of service and
remote management satisfying most of the needs of the SMB market.

Routing

The router supports static, dynamic and policy-based routing.

Static Routing - The network administrator can manually configure the routes

according to his network topology.

RIP - The Routing Information Protocol (or RIP) enables the routes to be learnt

dynamically, avoiding cumbersome manual configuration. The router supports
both RIPv1 and RIPv2 versions.

Policy-Based - Policy-based routing helps to define custom policies for routing

traffic. For example, policy routes can be defined to route all HTTP traffic
through WAN1 and E-mail traffic through WAN2.

High Availability

The Load-Balancing feature is an ideal solution for businesses requiring uninterrupted,
low cost internet connectivity. With multiple Internet connections, it effectively uses the
combined bandwidth of all the internet links resulting in a significant increase in the total
available bandwidth. Also if any Internet connection goes down, uninterrupted internet
connectivity is provided utilizing the serviceable links.

With Auto Backup feature, one of the links can function as the Primary WAN Link, and
the other as the Backup Link. When the Primary Link fails, the Backup Link will become
operational and traffic will switchover to this link. And when the Primary Link becomes
serviceable, the traffic will automatically switchback to the Primary Link.

Firewall


An integrated network security provides the following features

Stateful Packet Inspection (SPI) Firewall performs deep packet inspection to filter

out unwanted packets

Real-time Intrusion Detection and Prevention System (IDS/IPS) detects intruders

or hackers trying to damage your network and denies further access to the
network by blacklisting them.

Flexible access control policies to restrict or permit traffic based on IP

Address/Port, MAC Address or Domain Name.

URL/Content filtering of web traffic based on keywords, file extensions etc.