D-Link DFL-1660 User Manual page 13

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

User Manual
4.9. Creating an OSPF Router Process ................................................................... 220
4.10. Add an OSPF Area ..................................................................................... 221
4.11. Add OSPF Interface Objects ......................................................................... 221
4.12. Import Routes from an OSPF AS into the Main Routing Table ............................ 222
4.13. Exporting the Routes into an OSPF AS ........................................................... 223
4.14. Enabling OSPF Debug Log Events ................................................................. 225
4.15. Forwarding of Multicast Traffic using the SAT Multiplex Rule ........................... 229
4.16. Multicast Forwarding - Address Translation .................................................... 231
4.17. IGMP - No Address Translation .................................................................... 234
4.18. if1 Configuration ........................................................................................ 235
4.19. if2 Configuration - Group Translation ............................................................. 236
4.20. Setting up Transparent Mode for Scenario 1 .................................................... 247
4.21. Setting up Transparent Mode for Scenario 2 .................................................... 248
5.1. Setting up a DHCP server .............................................................................. 257
5.2. Static DHCP Host Assignment ........................................................................ 260
5.3. Setting up a DHCP Relayer ............................................................................ 262
5.4. Creating an IP Pool ....................................................................................... 267
6.1. Setting up an Access Rule .............................................................................. 271
6.2. Protecting an FTP Server with an ALG ............................................................. 280
6.3. Protecting FTP Clients .................................................................................. 283
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 311
6.5. H.323 with Private IPv4 Addresses .................................................................. 312
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 313
6.7. Using Private IPv4 Addresses ......................................................................... 314
6.8. H.323 with Gatekeeper .................................................................................. 315
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 317
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 318
6.11. Configuring remote offices for H.323 ............................................................. 321
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 321
6.13. Stripping ActiveX and Java applets ................................................................ 326
6.14. Setting up a white and blacklist ..................................................................... 327
6.15. Enabling Dynamic Web Content Filtering ....................................................... 330
6.16. Enabling Audit Mode .................................................................................. 332
6.17. Reclassifying a blocked site .......................................................................... 333
6.18. Editing Content Filtering HTTP Banner Files ................................................... 341
6.19. Activating Anti-Virus Scanning ..................................................................... 347
6.20. Configuring an SMTP Log Receiver .............................................................. 357
6.21. Setting up IDP for a Mail Server .................................................................... 358
6.22. Adding a Host to the Whitelist ...................................................................... 367
7.1. Specifying a NAT Rule .................................................................................. 372
7.2. Using NAT Pools ......................................................................................... 376
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 379
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 381
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 383
7.6. Translating Traffic to a Single Protected Web Server (N:1) .................................. 386
8.1. Creating an Authentication User Group ............................................................ 408
8.2. User Authentication Setup for Web Access ....................................................... 408
8.3. Configuring a RADIUS Server ....................................................................... 409
8.4. Editing Content Filtering HTTP Banner Files .................................................... 411
9.1. Using an Algorithm Proposal List .................................................................... 439
9.2. Using a Pre-Shared key ................................................................................. 440
9.3. Using an Identity List .................................................................................... 442
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 447
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 447
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients ................. 449
9.7. Setting Up Config Mode ................................................................................ 451
9.8. Using Config Mode with IPsec Tunnels ............................................................ 451
9.9. Setting up an LDAP server ............................................................................. 452
9.10. Setting up a PPTP server .............................................................................. 464
9.11. Setting up an L2TP server ............................................................................ 465
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 465
9.13. Setting Up an SSL VPN Interface .................................................................. 478
13

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560Dfl-2560gDfl-260eDfl-860e

Table of Contents