D-Link DFL-1660 User Manual page 8

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

10.1.11. A Summary of Traffic Shaping ................................................. 402
10.1.12. More Pipe Examples ............................................................... 402
10.2. IDP Traffic Shaping ............................................................................ 407
10.2.1. Overview ................................................................................ 407
10.2.2. Setup ..................................................................................... 407
10.2.3. Processing Flow ....................................................................... 408
10.2.4. The Importance of Specifying a Network ...................................... 408
10.2.5. A P2P Scenario ........................................................................ 409
10.2.6. Viewing Traffic Shaping Objects ................................................ 409
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 410
10.2.8. Logging ................................................................................. 411
10.3. Threshold Rules ................................................................................. 412
10.3.1. Overview ................................................................................ 412
10.3.3. Grouping ................................................................................ 412
10.3.4. Rule Actions ........................................................................... 413
10.3.5. Multiple Triggered Actions ........................................................ 413
10.3.6. Exempted Connections .............................................................. 413
10.3.7. Threshold Rules and ZoneDefense .............................................. 413
10.3.8. Threshold Rule Blacklisting ....................................................... 413
10.4. Server Load Balancing ........................................................................ 414
10.4.1. Overview ................................................................................ 414
10.4.2. Identifying the Servers .............................................................. 415
10.4.3. The Load Distribution Mode ...................................................... 415
10.4.4. The Distribution Algorithm ........................................................ 416
10.4.5. Server Health Monitoring .......................................................... 418
10.4.6. SLB_SAT Rules ....................................................................... 418
11. High Availability .......................................................................................... 422
11.1. Overview .......................................................................................... 422
11.2. HA Mechanisms ................................................................................. 424
11.3. HA Setup .......................................................................................... 427
11.3.1. HA Hardware Setup ................................................................. 427
11.3.2. NetDefendOS Manual HA Setup ................................................. 428
11.3.3. Verifying the Cluster Functions .................................................. 429
11.3.4. Unique Shared Mac Addresses ................................................... 430
11.4. HA Issues ......................................................................................... 431
11.5. HA Advanced Settings ........................................................................ 432
12. ZoneDefense ................................................................................................ 434
12.1. Overview .......................................................................................... 434
12.2. ZoneDefense Switches ......................................................................... 435
12.3. ZoneDefense Operation ....................................................................... 436
12.3.1. SNMP .................................................................................... 436
12.3.2. Threshold Rules ....................................................................... 436
12.3.3. Manual Blocking and Exclude Lists ............................................. 436
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................ 438
12.3.5. Limitations ............................................................................. 438
13. Advanced Settings ......................................................................................... 441
13.1. IP Level Settings ................................................................................ 441
13.2. TCP Level Settings ............................................................................. 445
13.3. ICMP Level Settings ........................................................................... 450
13.4. State Settings ..................................................................................... 451
13.5. Connection Timeout Settings ................................................................ 453
13.6. Length Limit Settings .......................................................................... 455
13.7. Fragmentation Settings ........................................................................ 457
13.8. Local Fragment Reassembly Settings ..................................................... 461
13.9. Miscellaneous Settings ........................................................................ 462
A. Subscribing to Security Updates ........................................................................ 464
B. IDP Signature Groups ..................................................................................... 466
C. Verified MIME filetypes ................................................................................. 470
D. The OSI Framework ....................................................................................... 474
E. D-Link Worldwide Offices ............................................................................... 475
Alphabetical Index ............................................................................................. 477
8

Advertisement

Table of Contents
loading

Table of Contents