D-Link NetDefend DFL-210 User Manual page 6

Network security firewall ver 2.26.01
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

5.2. DHCP Servers ..................................................................................... 193
5.3. Static DHCP Assignment ....................................................................... 196
5.3.1. DHCP Advanced Settings ............................................................ 196
5.4. DHCP Relaying ................................................................................... 198
5.4.1. DHCP Relay Advanced Settings ................................................... 199
5.5. IP Pools .............................................................................................. 201
6. Security Mechanisms ....................................................................................... 204
6.1. Access Rules ....................................................................................... 204
6.1.1. Overview ................................................................................. 204
6.1.2. IP Spoofing .............................................................................. 204
6.1.3. Access Rule Settings .................................................................. 205
6.2. ALGs ................................................................................................. 207
6.2.1. Overview ................................................................................. 207
6.2.2. The HTTP ALG ........................................................................ 208
6.2.3. The FTP ALG ........................................................................... 211
6.2.4. The TFTP ALG ......................................................................... 217
6.2.5. The SMTP ALG ........................................................................ 218
6.2.6. The POP3 ALG ......................................................................... 227
6.2.7. The PPTP ALG ......................................................................... 227
6.2.8. The SIP ALG ............................................................................ 229
6.2.9. The H.323 ALG ........................................................................ 239
6.2.10. The TLS ALG ......................................................................... 252
6.3. Web Content Filtering ........................................................................... 255
6.3.1. Overview ................................................................................. 255
6.3.2. Active Content Handling ............................................................. 255
6.3.3. Static Content Filtering ............................................................... 256
6.3.4. Dynamic Web Content Filtering ................................................... 258
6.4. Anti-Virus Scanning ............................................................................. 272
6.4.1. Overview ................................................................................. 272
6.4.2. Implementation ......................................................................... 272
6.4.3. Activating Anti-Virus Scanning .................................................... 273
6.4.4. The Signature Database .............................................................. 274
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 274
6.4.6. Anti-Virus Options ..................................................................... 274
6.5. Intrusion Detection and Prevention .......................................................... 278
6.5.1. Overview ................................................................................. 278
6.5.2. IDP Availability for D-Link Models .............................................. 278
6.5.3. IDP Rules ................................................................................. 280
6.5.4. Insertion/Evasion Attack Prevention .............................................. 281
6.5.5. IDP Pattern Matching ................................................................. 282
6.5.6. IDP Signature Groups ................................................................. 283
6.5.7. IDP Actions .............................................................................. 285
6.5.8. SMTP Log Receiver for IDP Events .............................................. 285
6.6. Denial-of-Service Attack Prevention ........................................................ 289
6.6.1. Overview ................................................................................. 289
6.6.2. DoS Attack Mechanisms ............................................................. 289
6.6.3. Ping of Death and Jolt Attacks ..................................................... 289
6.6.5. The Land and LaTierra attacks ..................................................... 290
6.6.6. The WinNuke attack ................................................................... 290
6.6.8. TCP SYN Flood Attacks ............................................................. 292
6.6.9. The Jolt2 Attack ........................................................................ 292
6.6.10. Distributed DoS Attacks ............................................................ 292
6.7. Blacklisting Hosts and Networks ............................................................. 294
7. Address Translation ........................................................................................ 297
7.1. Overview ............................................................................................ 297
7.2. NAT .................................................................................................. 298
7.3. NAT Pools .......................................................................................... 303
7.4. SAT ................................................................................................... 306
7.4.1. Translation of a Single IP Address (1:1) ......................................... 306
7.4.2. Translation of Multiple IP Addresses (M:N) .................................... 310
7.4.3. All-to-One Mappings (N:1) ......................................................... 312
6
User Manual

Advertisement

Table of Contents
loading

Table of Contents