D-Link NetDefend DFL-210 User Manual page 9

Network security firewall
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

List of Figures
1.1. Packet Flow Schematic Part I ...........................................................................19
1.2. Packet Flow Schematic Part II ..........................................................................20
1.3. Packet Flow Schematic Part III .........................................................................20
3.1. An Example GRE Scenario ..............................................................................64
4.1. A Route Failover Scenario for ISP Access ...........................................................94
4.2. Virtual Links Example 1 ................................................................................ 106
4.3. Virtual Links Example 2 ................................................................................ 107
4.4. Multicast Forwarding - No Address Translation ................................................. 111
4.5. Multicast Forwarding - Address Translation ...................................................... 112
4.6. Multicast Snoop ........................................................................................... 114
4.7. Multicast Proxy ........................................................................................... 115
4.8. Transparent mode scenario 1 .......................................................................... 121
4.9. Transparent mode scenario 2 .......................................................................... 122
6.1. DNSBL SPAM Filtering ................................................................................ 147
6.2. Dynamic Content Filtering Flow ..................................................................... 172
6.3. IDP Database Updating ................................................................................. 189
9.1. The AH protocol .......................................................................................... 247
9.2. The ESP protocol ......................................................................................... 247
10.1. Pipe rule set to Pipe Packet Flow ................................................................... 269
10.2. The Eight Pipe Precedences. ......................................................................... 272
10.3. Minimum and Maximum Pipe Precedence. ...................................................... 273
10.4. Traffic grouped per IP address. ...................................................................... 275
10.5. A Server Load Balancing configuration .......................................................... 281
10.6. Connections from Three Clients .................................................................... 283
10.7. Stickiness and Round-Robin ......................................................................... 283
10.8. Stickiness and Connection Rate ..................................................................... 284
11.1. High Availability Setup ............................................................................... 293
D.1. The 7 layers of the OSI model ........................................................................ 348
9

Advertisement

Table of Contents
loading

Table of Contents