D-Link NetDefend DFL-210 User Manual page 11

Network security firewall ver. 1.05
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

User Manual
6.5. H.323 with private IP addresses ...................................................................... 114
6.6. Two Phones Behind Different D-Link Firewalls ................................................. 115
6.7. Using Private IP Addresses ............................................................................ 116
6.8. H.323 with Gatekeeper .................................................................................. 118
6.9. H.323 with Gatekeeper and two D-Link Firewalls .............................................. 119
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 120
6.11. Configuring remote offices for H.323 ............................................................. 123
6.13. Configuring an SMTP Log Receiver .............................................................. 131
6.14. Setting up IDP for a Mail Server .................................................................... 132
6.15. Enabling Anti-Virus Scanning ....................................................................... 138
6.16. Stripping ActiveX and Java applets ................................................................ 141
6.17. Setting up a white and blacklist ..................................................................... 142
6.18. Enable Dynamic Content Filtering ................................................................. 144
6.19. Enabling Audit Mode .................................................................................. 145
6.20. Reclassifying a blocked site .......................................................................... 147
7.1. Adding a NAT Policy ................................................................................... 162
7.2. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 164
7.3. Enabling Traffic to a Web Server on an Internal Network .................................... 166
7.4. Translating Traffic to Multiple Protected Web Servers ........................................ 168
8.1. Creating an authentication user group ............................................................... 178
9.1. Using a Proposal List .................................................................................... 192
9.2. Using a Pre-Shared key ................................................................................. 193
9.3. Using an Identity List .................................................................................... 194
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 197
9.7. Setting up an LDAP server ............................................................................. 200
9.8. Setting up a PPTP server ................................................................................ 202
9.9. Setting up an L2TP server .............................................................................. 203
9.10. Setting up an L2TP Tunnel ........................................................................... 204
10.1. Applying a Simple Bandwidth Limit .............................................................. 211
10.2. Applying a Two-Way Bandwidth Limit .......................................................... 213
12.1. A simple ZoneDefense scenario .................................................................... 238
xi

Advertisement

Table of Contents
loading

Table of Contents