List of Figures
1.1. Packet Flow Schematic Part I ...........................................................................20
1.2. Packet Flow Schematic Part II ..........................................................................21
1.3. Packet Flow Schematic Part III .........................................................................22
1.4. Expanded Apply Rules Logic ............................................................................23
3.1. Simplified NetDefendOS Traffic Flow ............................................................. 102
4.1. Using Local IP Address with an Unbound Network ............................................ 126
4.2. A Route Failover Scenario for ISP Access ......................................................... 131
4.3. The RLB Round Robin Algorithm ................................................................... 142
4.4. The RLB Spillover Algorithm ......................................................................... 142
4.5. A Route Load Balancing Scenario ................................................................... 145
4.6. Virtual Links Example 1 ................................................................................ 150
4.7. Virtual Links Example 2 ................................................................................ 151
4.8. Multicast Forwarding - No Address Translation ................................................. 156
4.9. Multicast Forwarding - Address Translation ...................................................... 158
4.10. Multicast Snoop ......................................................................................... 160
4.11. Multicast Proxy .......................................................................................... 160
4.12. Non-transparent Mode Internet Access ........................................................... 171
4.13. Transparent Mode Internet Access ................................................................. 172
4.14. Transparent Mode Scenario 1 ........................................................................ 173
4.15. Transparent Mode Scenario 2 ........................................................................ 174
4.16. An Example BPDU Relaying Scenario ........................................................... 177
6.1. Deploying an ALG ....................................................................................... 196
6.2. HTTP ALG Processing Order ......................................................................... 199
6.3. SMTP ALG Processing Order ......................................................................... 209
6.4. DNSBL SPAM Filtering ................................................................................ 211
6.5. TLS Termination .......................................................................................... 239
6.6. Dynamic Content Filtering Flow ..................................................................... 245
6.7. IDP Database Updating ................................................................................. 266
7.1. NAT IP Address Translation .......................................................................... 284
7.2. Anonymizing with NAT ................................................................................ 287
8.1. Normal LDAP Authentication ........................................................................ 308
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 .................................. 309
9.1. The AH protocol .......................................................................................... 339
9.2. The ESP protocol ......................................................................................... 340
9.3. PPTP Client Usage ....................................................................................... 370
9.4. Certificate Validation Components .................................................................. 372
10.1. Packet Flow of Pipe Rule Set to Pipe .............................................................. 380
10.2. FwdFast Rules Bypass Traffic Shaping ........................................................... 380
10.3. The Eight Pipe Precedences .......................................................................... 384
10.4. Minimum and Maximum Pipe Precedence ....................................................... 385
10.5. Traffic grouped per IP address ...................................................................... 387
10.6. A Basic Traffic Shaping Scenario .................................................................. 390
10.7. IDP Traffic Shaping P2P Scenario ................................................................. 396
10.8. A Server Load Balancing Configuration .......................................................... 401
10.9. Connections from Three Clients .................................................................... 403
10.10. Stickiness and Round-Robin ....................................................................... 404
10.11. Stickiness and Connection Rate ................................................................... 404
11.1. High Availability Setup ............................................................................... 413
D.1. The 7 Layers of the OSI Model ...................................................................... 460
9
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...