List of Figures
1.2. Packet Flow Schematic Part II ..........................................................................25
1.3. Packet Flow Schematic Part III .........................................................................26
1.4. Expanded Apply Rules Logic ............................................................................27
3.1. VLAN Connections ...................................................................................... 118
3.2. An ARP Publish Ethernet Frame ..................................................................... 132
3.3. Simplified NetDefendOS Traffic Flow ............................................................. 140
4.2. Using Local IP Address with an Unbound Network ............................................ 171
4.3. A Route Failover Scenario for ISP Access ......................................................... 177
4.4. A Proxy ARP Example .................................................................................. 184
4.5. The RLB Round Robin Algorithm ................................................................... 194
4.6. The RLB Spillover Algorithm ......................................................................... 195
4.9. OSPF Providing Route Redundancy ................................................................. 201
4.10. Virtual Links Connecting Areas .................................................................... 205
4.11. Virtual Links with Partitioned Backbone ......................................................... 206
4.14. An OSPF Example ...................................................................................... 220
4.17. Multicast Snoop Mode ................................................................................. 233
4.18. Multicast Proxy Mode ................................................................................. 233
4.19. Non-transparent Mode Internet Access ........................................................... 245
4.21. Transparent Mode Scenario 1 ........................................................................ 247
4.22. Transparent Mode Scenario 2 ........................................................................ 248
4.23. An Example BPDU Relaying Scenario ........................................................... 251
5.1. DHCP Server Objects ................................................................................... 259
6.1. Deploying an ALG ....................................................................................... 272
6.2. HTTP ALG Processing Order ......................................................................... 275
6.3. FTP ALG Hybrid Mode ................................................................................. 277
6.4. SMTP ALG Processing Order ......................................................................... 288
6.6. PPTP ALG Usage ........................................................................................ 296
6.7. TLS Termination .......................................................................................... 323
6.9. IDP Database Updating ................................................................................. 350
7.1. NAT IP Address Translation .......................................................................... 370
7.2. A NAT Example .......................................................................................... 372
7.4. The Role of the DMZ .................................................................................... 379
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 .................................. 402
9.1. The AH protocol .......................................................................................... 437
9.2. The ESP protocol ......................................................................................... 437
9.3. PPTP Client Usage ....................................................................................... 471
9.4. SSL VPN Browser Connection Choices ............................................................ 475
10.1. Pipe Rules Determine Pipe Usage .................................................................. 493
10.2. FwdFast Rules Bypass Traffic Shaping ........................................................... 494
10.4. The Eight Pipe Precedences .......................................................................... 498
10