D-Link DFL-260E User Manual page 6

Network security firewall netdefendos version 2.27.03
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

4.7. Transparent Mode ................................................................................ 212
4.7.1. Overview ................................................................................. 212
4.7.2. Enabling Internet Access ............................................................. 217
4.7.3. Transparent Mode Scenarios ........................................................ 218
4.7.4. Spanning Tree BPDU Support ...................................................... 222
4.7.5. Advanced Settings for Transparent Mode ....................................... 223
5. DHCP Services .............................................................................................. 228
5.1. Overview ............................................................................................ 228
5.2. DHCP Servers ..................................................................................... 229
5.2.1. Static DHCP Hosts ..................................................................... 232
5.2.2. Custom Options ......................................................................... 233
5.3. DHCP Relaying ................................................................................... 235
5.3.1. DHCP Relay Advanced Settings ................................................... 236
5.4. IP Pools .............................................................................................. 238
6. Security Mechanisms ....................................................................................... 242
6.1. Access Rules ....................................................................................... 242
6.1.1. Overview ................................................................................. 242
6.1.2. IP Spoofing .............................................................................. 243
6.1.3. Access Rule Settings .................................................................. 243
6.2. ALGs ................................................................................................. 245
6.2.1. Overview ................................................................................. 245
6.2.2. The HTTP ALG ........................................................................ 246
6.2.3. The FTP ALG ........................................................................... 249
6.2.4. The TFTP ALG ......................................................................... 258
6.2.5. The SMTP ALG ........................................................................ 259
6.2.6. The POP3 ALG ......................................................................... 268
6.2.7. The PPTP ALG ......................................................................... 269
6.2.8. The SIP ALG ............................................................................ 270
6.2.9. The H.323 ALG ........................................................................ 280
6.2.10. The TLS ALG ......................................................................... 294
6.3. Web Content Filtering ........................................................................... 297
6.3.1. Overview ................................................................................. 297
6.3.2. Active Content Handling ............................................................. 297
6.3.3. Static Content Filtering ............................................................... 298
6.3.4. Dynamic Web Content Filtering ................................................... 300
6.4. Anti-Virus Scanning ............................................................................. 314
6.4.1. Overview ................................................................................. 314
6.4.2. Implementation ......................................................................... 314
6.4.3. Activating Anti-Virus Scanning .................................................... 315
6.4.4. The Signature Database .............................................................. 316
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 316
6.4.6. Anti-Virus Options ..................................................................... 316
6.5. Intrusion Detection and Prevention .......................................................... 320
6.5.1. Overview ................................................................................. 320
6.5.2. IDP Availability for D-Link Models .............................................. 320
6.5.3. IDP Rules ................................................................................. 322
6.5.4. Insertion/Evasion Attack Prevention .............................................. 324
6.5.5. IDP Pattern Matching ................................................................. 325
6.5.6. IDP Signature Groups ................................................................. 326
6.5.7. IDP Actions .............................................................................. 327
6.5.8. SMTP Log Receiver for IDP Events .............................................. 328
6.6. Denial-of-Service Attack Prevention ........................................................ 332
6.6.1. Overview ................................................................................. 332
6.6.2. DoS Attack Mechanisms ............................................................. 332
6.6.3. Ping of Death and Jolt Attacks ..................................................... 332
6.6.5. The Land and LaTierra attacks ..................................................... 333
6.6.6. The WinNuke attack ................................................................... 333
6.6.8. TCP SYN Flood Attacks ............................................................. 335
6.6.9. The Jolt2 Attack ........................................................................ 335
6.6.10. Distributed DoS Attacks ............................................................ 335
6.7. Blacklisting Hosts and Networks ............................................................. 337
6
User Manual

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents