D-Link DFL-260E User Manual page 13

Network security firewall netdefendos version 2.27.03
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

User Manual
4.14. IGMP - No Address Translation .................................................................... 206
4.15. if1 Configuration ........................................................................................ 207
4.16. if2 Configuration - Group Translation ............................................................. 208
4.17. Setting up Transparent Mode for Scenario 1 .................................................... 219
4.18. Setting up Transparent Mode for Scenario 2 .................................................... 220
5.1. Setting up a DHCP server .............................................................................. 230
5.2. Checking DHCP Server Status ........................................................................ 231
5.3. Static DHCP Host Assignment ........................................................................ 233
5.4. Setting up a DHCP Relayer ............................................................................ 235
5.5. Creating an IP Pool ....................................................................................... 240
6.1. Setting up an Access Rule .............................................................................. 244
6.2. Protecting an FTP Server with an ALG ............................................................. 253
6.3. Protecting FTP Clients .................................................................................. 256
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 282
6.5. H.323 with private IP addresses ...................................................................... 284
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 285
6.7. Using Private IP Addresses ............................................................................ 286
6.8. H.323 with Gatekeeper .................................................................................. 287
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 289
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 290
6.11. Configuring remote offices for H.323 ............................................................. 293
6.13. Stripping ActiveX and Java applets ................................................................ 298
6.14. Setting up a white and blacklist ..................................................................... 299
6.15. Enabling Dynamic Web Content Filtering ....................................................... 302
6.16. Enabling Audit Mode .................................................................................. 304
6.17. Reclassifying a blocked site .......................................................................... 305
6.18. Editing Content Filtering HTTP Banner Files ................................................... 312
6.19. Activating Anti-Virus Scanning ..................................................................... 318
6.20. Configuring an SMTP Log Receiver .............................................................. 328
6.21. Setting up IDP for a Mail Server .................................................................... 329
6.22. Adding a Host to the Whitelist ...................................................................... 338
7.1. Adding a NAT Rule ...................................................................................... 343
7.2. Using NAT Pools ......................................................................................... 347
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 350
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 352
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 354
8.1. Creating an Authentication User Group ............................................................ 377
8.2. User Authentication Setup for Web Access ....................................................... 377
8.3. Configuring a RADIUS Server ....................................................................... 378
8.4. Editing Content Filtering HTTP Banner Files .................................................... 380
9.1. Using an Algorithm Proposal List .................................................................... 407
9.2. Using a Pre-Shared key ................................................................................. 408
9.3. Using an Identity List .................................................................................... 409
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 415
9.7. Setting Up Config Mode ................................................................................ 418
9.8. Using Config Mode with IPsec Tunnels ............................................................ 419
9.9. Setting up an LDAP server ............................................................................. 419
9.10. Setting up a PPTP server .............................................................................. 432
9.11. Setting up an L2TP server ............................................................................ 433
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 433
10.1. Applying a Simple Bandwidth Limit .............................................................. 454
10.2. Limiting Bandwidth in Both Directions ........................................................... 456
10.3. Setting up SLB ........................................................................................... 485
12.1. A simple ZoneDefense scenario .................................................................... 507
13

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents