4.7. Transparent Mode ................................................................................ 212
4.7.1. Overview ................................................................................. 212
5. DHCP Services .............................................................................................. 228
5.1. Overview ............................................................................................ 228
5.2. DHCP Servers ..................................................................................... 229
5.3. DHCP Relaying ................................................................................... 235
5.4. IP Pools .............................................................................................. 238
6. Security Mechanisms ....................................................................................... 242
6.1. Access Rules ....................................................................................... 242
6.1.1. Overview ................................................................................. 242
6.1.2. IP Spoofing .............................................................................. 243
6.2. ALGs ................................................................................................. 245
6.2.1. Overview ................................................................................. 245
6.2.2. The HTTP ALG ........................................................................ 246
6.2.3. The FTP ALG ........................................................................... 249
6.2.4. The TFTP ALG ......................................................................... 258
6.2.5. The SMTP ALG ........................................................................ 259
6.2.6. The POP3 ALG ......................................................................... 268
6.2.7. The PPTP ALG ......................................................................... 269
6.2.8. The SIP ALG ............................................................................ 270
6.2.10. The TLS ALG ......................................................................... 294
6.3.1. Overview ................................................................................. 297
6.4.1. Overview ................................................................................. 314
6.5.1. Overview ................................................................................. 320
6.5.3. IDP Rules ................................................................................. 322
6.5.7. IDP Actions .............................................................................. 327
6.6.1. Overview ................................................................................. 332
6
User Manual