4.9. Creating an OSPF Router Process ................................................................... 220
4.10. Add an OSPF Area ..................................................................................... 221
4.11. Add OSPF Interface Objects ......................................................................... 221
4.12. Import Routes from an OSPF AS into the Main Routing Table ............................ 222
4.13. Exporting the Routes into an OSPF AS ........................................................... 223
4.14. Enabling OSPF Debug Log Events ................................................................. 225
4.15. Forwarding of Multicast Traffic using the SAT Multiplex Rule ........................... 229
4.16. Multicast Forwarding - Address Translation .................................................... 231
4.17. IGMP - No Address Translation .................................................................... 234
4.18. if1 Configuration ........................................................................................ 235
4.19. if2 Configuration - Group Translation ............................................................. 236
4.20. Setting up Transparent Mode for Scenario 1 .................................................... 247
4.21. Setting up Transparent Mode for Scenario 2 .................................................... 248
5.1. Setting up a DHCP server .............................................................................. 257
5.2. Static DHCP Host Assignment ........................................................................ 260
5.3. Setting up a DHCP Relayer ............................................................................ 262
5.4. Creating an IP Pool ....................................................................................... 267
6.1. Setting up an Access Rule .............................................................................. 271
6.2. Protecting an FTP Server with an ALG ............................................................. 280
6.3. Protecting FTP Clients .................................................................................. 283
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 311
6.5. H.323 with Private IPv4 Addresses .................................................................. 312
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 313
6.7. Using Private IPv4 Addresses ......................................................................... 314
6.8. H.323 with Gatekeeper .................................................................................. 315
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 317
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 318
6.11. Configuring remote offices for H.323 ............................................................. 321
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 321
6.13. Stripping ActiveX and Java applets ................................................................ 326
6.14. Setting up a white and blacklist ..................................................................... 327
6.15. Enabling Dynamic Web Content Filtering ....................................................... 330
6.16. Enabling Audit Mode .................................................................................. 332
6.17. Reclassifying a blocked site .......................................................................... 333
6.18. Editing Content Filtering HTTP Banner Files ................................................... 341
6.19. Activating Anti-Virus Scanning ..................................................................... 347
6.20. Configuring an SMTP Log Receiver .............................................................. 357
6.21. Setting up IDP for a Mail Server .................................................................... 358
6.22. Adding a Host to the Whitelist ...................................................................... 367
7.1. Specifying a NAT Rule .................................................................................. 372
7.2. Using NAT Pools ......................................................................................... 376
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 379
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 381
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 383
7.6. Translating Traffic to a Single Protected Web Server (N:1) .................................. 386
8.1. Creating an Authentication User Group ............................................................ 408
8.2. User Authentication Setup for Web Access ....................................................... 408
8.3. Configuring a RADIUS Server ....................................................................... 409
8.4. Editing Content Filtering HTTP Banner Files .................................................... 411
9.1. Using an Algorithm Proposal List .................................................................... 439
9.2. Using a Pre-Shared key ................................................................................. 440
9.3. Using an Identity List .................................................................................... 442
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 447
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 447
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients ................. 449
9.7. Setting Up Config Mode ................................................................................ 451
9.8. Using Config Mode with IPsec Tunnels ............................................................ 451
9.9. Setting up an LDAP server ............................................................................. 452
9.10. Setting up a PPTP server .............................................................................. 464
9.11. Setting up an L2TP server ............................................................................ 465
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 465
9.13. Setting Up an SSL VPN Interface .................................................................. 478
User Manual
13
Summary of Contents for NetDefend DFL-1660
Page 28: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 28 ...
Page 88: ...2 6 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 88 ...
Page 166: ...3 10 DNS Chapter 3 Fundamentals 166 ...
Page 254: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 254 ...
Page 268: ...5 4 IP Pools Chapter 5 DHCP Services 268 ...
Page 368: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 368 ...
Page 390: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 390 ...
Page 414: ...8 3 Customizing Authentication HTML Pages Chapter 8 User Authentication 414 ...
Page 490: ...9 8 6 Specific Symptoms Chapter 9 VPN 490 ...
Page 528: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 528 ...
Page 544: ...11 7 HA Advanced Settings Chapter 11 High Availability 544 ...
Page 551: ...12 3 5 Limitations Chapter 12 ZoneDefense 551 ...
Page 574: ...Default 512 13 9 Miscellaneous Settings Chapter 13 Advanced Settings 574 ...
Page 575: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 575 ...