D-Link NetDefend DFL-210 User Manual page 12

Network security firewall ver 2.26.01
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

User Manual
4.13. if2 Configuration - Group Translation ............................................................. 173
4.14. Setting up Transparent Mode for Scenario 1 .................................................... 184
4.15. Setting up Transparent Mode for Scenario 2 .................................................... 185
5.1. Setting up a DHCP server .............................................................................. 194
5.2. Checking DHCP Server Status ........................................................................ 194
5.3. Setting up Static DHCP ................................................................................. 196
5.4. Setting up a DHCP Relayer ............................................................................ 198
5.5. Creating an IP Pool ....................................................................................... 202
6.1. Setting up an Access Rule .............................................................................. 206
6.2. Protecting an FTP Server with an ALG ............................................................. 213
6.3. Protecting FTP Clients .................................................................................. 216
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 241
6.5. H.323 with private IP addresses ...................................................................... 242
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 243
6.7. Using Private IP Addresses ............................................................................ 244
6.8. H.323 with Gatekeeper .................................................................................. 245
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 247
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 248
6.11. Configuring remote offices for H.323 ............................................................. 251
6.13. Stripping ActiveX and Java applets ................................................................ 256
6.14. Setting up a white and blacklist ..................................................................... 257
6.15. Enabling Dynamic Web Content Filtering ....................................................... 260
6.16. Enabling Audit Mode .................................................................................. 262
6.17. Reclassifying a blocked site .......................................................................... 263
6.18. Editing Content Filtering HTTP Banner Files ................................................... 270
6.19. Activating Anti-Virus Scanning ..................................................................... 276
6.20. Configuring an SMTP Log Receiver .............................................................. 286
6.21. Setting up IDP for a Mail Server .................................................................... 286
6.22. Adding a Host to the Whitelist ...................................................................... 295
7.1. Adding a NAT Rule ...................................................................................... 300
7.2. Using NAT Pools ......................................................................................... 304
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 306
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 308
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 310
8.1. Creating an Authentication User Group ............................................................ 331
8.2. User Authentication Setup for Web Access ....................................................... 331
8.3. Configuring a RADIUS Server ....................................................................... 332
8.4. Editing Content Filtering HTTP Banner Files .................................................... 334
9.1. Using an Algorithm Proposal List .................................................................... 361
9.2. Using a Pre-Shared key ................................................................................. 362
9.3. Using an Identity List .................................................................................... 363
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 367
9.7. Setting Up Config Mode ................................................................................ 371
9.8. Using Config Mode with IPsec Tunnels ............................................................ 371
9.9. Setting up an LDAP server ............................................................................. 371
9.10. Setting up a PPTP server .............................................................................. 384
9.11. Setting up an L2TP server ............................................................................ 385
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 385
10.1. Applying a Simple Bandwidth Limit .............................................................. 405
10.2. Limiting Bandwidth in Both Directions ........................................................... 407
10.3. Setting up SLB ........................................................................................... 431
12.1. A simple ZoneDefense scenario .................................................................... 449
12

Advertisement

Table of Contents
loading

Table of Contents