D-Link NetDefend DFL-210 User Manual page 6

Network security firewall
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

6.3. Web Content Filtering ........................................................................... 169
6.3.1. Overview ................................................................................. 169
6.3.2. Active Content Handling ............................................................. 169
6.3.3. Static Content Filtering ............................................................... 170
6.3.4. Dynamic Web Content Filtering ................................................... 172
6.4. Anti-Virus Scanning ............................................................................. 183
6.4.1. Overview ................................................................................. 183
6.4.2. Implementation ......................................................................... 183
6.4.3. Activating Anti-Virus Scanning .................................................... 184
6.4.4. The Signature Database .............................................................. 184
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 184
6.4.6. Anti-Virus Options ..................................................................... 184
6.5. Intrusion Detection and Prevention .......................................................... 188
6.5.1. Overview ................................................................................. 188
6.5.2. IDP Availability in D-Link Models ............................................... 188
6.5.3. IDP Rules ................................................................................. 190
6.5.4. Insertion/Evasion Attack Prevention .............................................. 191
6.5.5. IDP Pattern Matching ................................................................. 192
6.5.6. IDP Signature Groups ................................................................. 192
6.5.7. IDP Actions .............................................................................. 194
6.5.8. SMTP Log Receiver for IDP Events .............................................. 194
6.6. Denial-Of-Service (DoS) Attacks ............................................................ 198
6.6.1. Overview ................................................................................. 198
6.6.2. DoS Attack Mechanisms ............................................................. 198
6.6.3. Ping of Death and Jolt Attacks ..................................................... 198
6.6.5. The Land and LaTierra attacks ..................................................... 199
6.6.6. The WinNuke attack ................................................................... 199
6.6.8. TCP SYN Flood Attacks ............................................................. 201
6.6.9. The Jolt2 Attack ........................................................................ 201
6.6.10. Distributed DoS Attacks ............................................................ 201
6.7. Blacklisting Hosts and Networks ............................................................. 202
7. Address Translation ........................................................................................ 204
7.1. Dynamic Network Address Translation .................................................... 204
7.2. NAT Pools .......................................................................................... 207
7.3. Static Address Translation ..................................................................... 210
7.3.1. Translation of a Single IP Address (1:1) ......................................... 210
7.3.2. Translation of Multiple IP Addresses (M:N) .................................... 213
7.3.3. All-to-One Mappings (N:1) ......................................................... 215
7.3.4. Port Translation ......................................................................... 216
7.3.5. Protocols handled by SAT ........................................................... 216
7.3.6. Multiple SAT rule matches .......................................................... 217
7.3.7. SAT and FwdFast Rules .............................................................. 217
8. User Authentication ........................................................................................ 220
8.1. Overview ............................................................................................ 220
8.2. Authentication Setup ............................................................................. 221
8.2.1. Setup Summary ......................................................................... 221
8.2.2. The Local Database .................................................................... 221
8.2.3. External Authentication Servers .................................................... 221
8.2.4. Authentication Rules .................................................................. 222
8.2.5. Authentication Processing ........................................................... 223
8.2.6. HTTP Authentication ................................................................. 223
9. VPN ............................................................................................................. 229
9.1. Overview ............................................................................................ 229
9.1.1. The Need for VPNs .................................................................... 229
9.1.2. VPN Encryption ........................................................................ 229
9.1.3. VPN Planning ........................................................................... 229
9.1.4. Key Distribution ........................................................................ 230
9.2. VPN Quickstart Guide .......................................................................... 231
9.2.1. IPsec LAN to LAN with Pre-shared Keys ....................................... 231
9.2.2. IPsec Roaming Clients with Pre-shared Keys .................................. 232
6
User Manual

Advertisement

Table of Contents
loading

Table of Contents