D-Link DFL-1660 User Manual page 11

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

User Manual
4.13. if2 Configuration - Group Translation ............................................................. 170
4.14. Setting up Transparent Mode for Scenario 1 .................................................... 180
4.15. Setting up Transparent Mode for Scenario 2 .................................................... 182
5.1. Setting up a DHCP server .............................................................................. 191
5.2. Checking DHCP Server Status ........................................................................ 191
5.3. Setting up Static DHCP ................................................................................. 193
5.4. Setting up a DHCP Relayer ............................................................................ 195
5.5. Creating an IP Pool ....................................................................................... 199
6.1. Setting up an Access Rule .............................................................................. 203
6.2. Protecting an FTP Server with an ALG ............................................................. 210
6.3. Protecting FTP Clients .................................................................................. 213
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 236
6.5. H.323 with private IP addresses ...................................................................... 238
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 239
6.7. Using Private IP Addresses ............................................................................ 240
6.8. H.323 with Gatekeeper .................................................................................. 241
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 243
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 244
6.11. Configuring remote offices for H.323 ............................................................. 247
6.13. Stripping ActiveX and Java applets ................................................................ 252
6.14. Setting up a white and blacklist ..................................................................... 253
6.15. Enabling Dynamic Web Content Filtering ....................................................... 256
6.16. Enabling Audit Mode .................................................................................. 257
6.17. Reclassifying a blocked site .......................................................................... 259
6.18. Editing Content Filtering HTTP Banner Files ................................................... 266
6.19. Activating Anti-Virus Scanning ..................................................................... 272
6.20. Configuring an SMTP Log Receiver .............................................................. 281
6.21. Setting up IDP for a Mail Server .................................................................... 282
6.22. Adding a Host to the Whitelist ...................................................................... 290
7.1. Adding a NAT Rule ...................................................................................... 294
7.2. Using NAT Pools ......................................................................................... 298
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 300
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 302
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 304
8.1. Creating an Authentication User Group ............................................................ 323
8.2. User Authentication Setup for Web Access ....................................................... 323
8.3. Configuring a RADIUS Server ....................................................................... 324
8.4. Editing Content Filtering HTTP Banner Files .................................................... 326
9.1. Using an Algorithm Proposal List .................................................................... 353
9.2. Using a Pre-Shared key ................................................................................. 354
9.3. Using an Identity List .................................................................................... 355
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 359
9.7. Setting Up Config Mode ................................................................................ 363
9.8. Using Config Mode with IPsec Tunnels ............................................................ 363
9.9. Setting up an LDAP server ............................................................................. 363
9.10. Setting up a PPTP server .............................................................................. 376
9.11. Setting up an L2TP server ............................................................................ 376
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 377
10.1. Applying a Simple Bandwidth Limit .............................................................. 393
10.2. Limiting Bandwidth in Both Directions ........................................................... 395
10.3. Setting up SLB ........................................................................................... 419
12.1. A simple ZoneDefense scenario .................................................................... 437
11

Advertisement

Table of Contents
loading

Table of Contents