D-Link NetDefend DFL-210 User Manual page 11

Network security firewall
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

User Manual
4.12. if1 Configuration ........................................................................................ 162
4.13. if2 Configuration - Group Translation ............................................................. 163
4.14. Setting up Transparent Mode for Scenario 1 .................................................... 173
4.15. Setting up Transparent Mode for Scenario 2 .................................................... 175
5.1. Setting up a DHCP server .............................................................................. 184
5.2. Checking the status of a DHCP server .............................................................. 184
5.3. Setting up Static DHCP ................................................................................. 185
5.4. Setting up a DHCP Relayer ............................................................................ 187
5.5. Creating an IP Pool ....................................................................................... 191
6.1. Setting up an Access Rule .............................................................................. 195
6.2. Protecting an FTP Server with an ALG ............................................................. 202
6.3. Protecting FTP Clients .................................................................................. 205
6.4. Protecting Phones Behind D-Link Firewalls ...................................................... 228
6.5. H.323 with private IP addresses ...................................................................... 230
6.6. Two Phones Behind Different D-Link Firewalls ................................................. 231
6.7. Using Private IP Addresses ............................................................................ 232
6.8. H.323 with Gatekeeper .................................................................................. 233
6.9. H.323 with Gatekeeper and two D-Link Firewalls .............................................. 235
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 236
6.11. Configuring remote offices for H.323 ............................................................. 238
6.13. Stripping ActiveX and Java applets ................................................................ 243
6.14. Setting up a white and blacklist ..................................................................... 244
6.15. Enabling Dynamic Web Content Filtering ....................................................... 247
6.16. Enabling Audit Mode .................................................................................. 248
6.17. Reclassifying a blocked site .......................................................................... 250
6.18. Editing Content Filtering HTTP Banner Files ................................................... 257
6.19. Activating Anti-Virus Scanning ..................................................................... 263
6.20. Configuring an SMTP Log Receiver .............................................................. 272
6.21. Setting up IDP for a Mail Server .................................................................... 273
6.22. Adding a Host to the Whitelist ...................................................................... 281
7.1. Adding a NAT Rule ...................................................................................... 285
7.2. Using NAT Pools ......................................................................................... 289
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 291
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 293
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 295
8.1. Creating an Authentication User Group ............................................................ 313
8.2. User Authentication Setup for Web Access ....................................................... 313
8.3. Configuring a RADIUS Server ....................................................................... 314
8.4. Editing Content Filtering HTTP Banner Files .................................................... 316
9.1. Using an Algorithm Proposal List .................................................................... 342
9.2. Using a Pre-Shared key ................................................................................. 343
9.3. Using an Identity List .................................................................................... 344
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 347
9.7. Setting Up Config Mode ................................................................................ 351
9.8. Using Config Mode with IPsec Tunnels ............................................................ 351
9.9. Setting up an LDAP server ............................................................................. 352
9.10. Setting up a PPTP server .............................................................................. 364
9.11. Setting up an L2TP server ............................................................................ 364
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 365
10.1. Applying a Simple Bandwidth Limit .............................................................. 381
10.2. Limiting Bandwidth in Both Directions ........................................................... 382
10.3. Setting up SLB ........................................................................................... 406
12.1. A simple ZoneDefense scenario .................................................................... 423
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents