4.12. if1 Configuration ........................................................................................ 162
4.13. if2 Configuration - Group Translation ............................................................. 163
4.14. Setting up Transparent Mode for Scenario 1 .................................................... 173
4.15. Setting up Transparent Mode for Scenario 2 .................................................... 175
5.1. Setting up a DHCP server .............................................................................. 184
5.2. Checking the status of a DHCP server .............................................................. 184
5.3. Setting up Static DHCP ................................................................................. 185
5.4. Setting up a DHCP Relayer ............................................................................ 187
5.5. Creating an IP Pool ....................................................................................... 191
6.1. Setting up an Access Rule .............................................................................. 195
6.2. Protecting an FTP Server with an ALG ............................................................. 202
6.3. Protecting FTP Clients .................................................................................. 205
6.4. Protecting Phones Behind D-Link Firewalls ...................................................... 228
6.5. H.323 with private IP addresses ...................................................................... 230
6.6. Two Phones Behind Different D-Link Firewalls ................................................. 231
6.7. Using Private IP Addresses ............................................................................ 232
6.8. H.323 with Gatekeeper .................................................................................. 233
6.9. H.323 with Gatekeeper and two D-Link Firewalls .............................................. 235
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 236
6.11. Configuring remote offices for H.323 ............................................................. 238
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 238
6.13. Stripping ActiveX and Java applets ................................................................ 243
6.14. Setting up a white and blacklist ..................................................................... 244
6.15. Enabling Dynamic Web Content Filtering ....................................................... 247
6.16. Enabling Audit Mode .................................................................................. 248
6.17. Reclassifying a blocked site .......................................................................... 250
6.18. Editing Content Filtering HTTP Banner Files ................................................... 257
6.19. Activating Anti-Virus Scanning ..................................................................... 263
6.20. Configuring an SMTP Log Receiver .............................................................. 272
6.21. Setting up IDP for a Mail Server .................................................................... 273
6.22. Adding a Host to the Whitelist ...................................................................... 281
7.1. Adding a NAT Rule ...................................................................................... 285
7.2. Using NAT Pools ......................................................................................... 289
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 291
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 293
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 295
8.1. Creating an Authentication User Group ............................................................ 313
8.2. User Authentication Setup for Web Access ....................................................... 313
8.3. Configuring a RADIUS Server ....................................................................... 314
8.4. Editing Content Filtering HTTP Banner Files .................................................... 316
9.1. Using an Algorithm Proposal List .................................................................... 342
9.2. Using a Pre-Shared key ................................................................................. 343
9.3. Using an Identity List .................................................................................... 344
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 347
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 348
9.6. Setting up a CA Server issued Certificate based VPN tunnel for roaming clients ....... 349
9.7. Setting Up Config Mode ................................................................................ 351
9.8. Using Config Mode with IPsec Tunnels ............................................................ 351
9.9. Setting up an LDAP server ............................................................................. 352
9.10. Setting up a PPTP server .............................................................................. 364
9.11. Setting up an L2TP server ............................................................................ 364
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 365
10.1. Applying a Simple Bandwidth Limit .............................................................. 381
10.2. Limiting Bandwidth in Both Directions ........................................................... 382
10.3. Setting up SLB ........................................................................................... 406
12.1. A simple ZoneDefense scenario .................................................................... 423
User Manual
11
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...