Our website uses cookies. By using the site you agree to our Cookie Policy. Learn more


Version Date Type File Size
Version Description Date Type File Size
Show moreShow less
Quick Installation Guides
Version Description Date Type File Size
Show moreShow less
Do NOT upgrade firmware on any D-Link product over a wireless connection. Failure of the device may result. Use only hard-wired network connections.
Version Description Date
Firmware GPL Release Source
Show moreShow less
Additional Downloads
Version Description Date
Show moreShow less

Real Transparent Mode Implementation
  • Easy Installation with No Change to Existing Network Architecture
  • Interoperability with third-party network devices

Hardware-Based Layer 7 Payload Inspection
  • High-Performance Processing via ASIC Content Processing Chip

Granular Management by Hosts, IPs, Groups and Subnets
  • Transparent Control of IM, P2P, File Transfers, Streaming Media, Personal Mail
  • Discreet Control of Internet Activities Through Application of Policy-Based Actions on Hosts, Groups, IP Addresses, Subnets

Transparent Blocking of Trojan, Spyware, Illegal Agents, and Network Worms
  • Prevention of Malicious Traffic Spreading on the Network

Victim Identification
  • Isolation of Trouble Spots for Troubleshooting

Hardware Bypass
  • No Single Points of Failure, Maximized Network Connection in Case of Hardware Crash

Log/Analysis Report
  • Easily Readable Reports Printable in HTML Formats

DOS/DDOS Protection, Stealth Mode
  • Protection from Various Kinds of DOS/DDOS Attacks
  • No Response to ICMP Packets in Stealth Mode

IM/P2P Management
  • Control/management of IM applications
  • Control/management of P2P applications
  • Policy setting by IP, host name, group or subnet  

Layer 7 Applications Management
  • Control/Management of Mile Transfers
  • Control/Management of Streaming Media
  • Control/Management of Web Applications
  • Control/Management of Email for Personal Use
  • User-Defined Application Control

Health Checking
  • Detection/Blocking of Malicious Programs such as Spyware, SoftEther, Network Worms
  • Victim Identification in Intranet
  • D-Link Zone Defense Mechanism1 to Prevent Malicious Programs from Spreading on Network when Used in Conjunction with Certain D-Link Mananged Switches

Real-Time Monitor and Report
  • Real-time Traffic Monitoring
  • Multi-Layer TOP N Reports

  • Plug-and-play Installation with No Change to Existing Network
  • Transparent In-line mode, Seamless Integration with Other Network Devices
  • Java Web-Based Setup Wizard
  • Hardware Bypass Mechanism to Maximize Network Connectivity
  • Stealth Mode for Interface

  • 4,000 Concurrent TCP sessions
  • Up to 150 Concurrent Users
  • Up to 22Mbps Throughput (All Functions Enabled)
  • Up to 80Mbps Throughput (Bypass Mode)

Power Input
  • Internal Universal Power Supply

  • Standard 19-Inch Rackmount, 1U Height
  • 17.3” x 9.8” x 1.75”

Operating Temperature
  • 32°F to 140°F

Storage Temperature
  • -4°F to 158°F

  • UL/CUL
  • LVD (EN60950)

  • FCC Class A
  • CE Class A
  • C-Tick

Operating Humidity
  • 5% to 95% (non-condensing)

  • 1-Year

1 Future firmware upgrade.