D-Link NetDefend DFL-210 User Manual page 5

Network security firewall ver. 1.05
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

3.5. The IP Rule-Set .....................................................................................52
3.5.1. Overview ...................................................................................52
3.5.2. Rule Evaluation ...........................................................................52
3.5.3. IP Rule components .....................................................................53
3.5.4. Editing IP Rule-set Entries .............................................................54
3.6. Schedules .............................................................................................55
3.7. X.509 Certificates ..................................................................................57
3.7.1. Overview ...................................................................................57
3.7.2. The Certification Authority ............................................................57
3.7.3. Validity Time ..............................................................................57
3.7.4. Certificate Revocation Lists ...........................................................57
3.7.5. Trusting Certificates .....................................................................58
3.7.6. Identification Lists .......................................................................58
3.7.7. X.509 Certificates in NetDefendOS .................................................58
3.8. Setting Date and Time .............................................................................59
3.8.1. General Date and Time Settings ......................................................59
3.8.2. Time Servers ..............................................................................60
3.9. DNS Lookup .........................................................................................64
4. Routing ...........................................................................................................66
4.1. Overview ..............................................................................................66
4.2. Static Routing ........................................................................................67
4.2.1. Static Routing in NetDefendOS ......................................................68
4.2.2. Route Failover ............................................................................71
4.2.3. Proxy ARP .................................................................................75
4.3. Policy-based Routing ..............................................................................76
4.3.1. Overview ...................................................................................76
4.3.2. Policy-based Routing Tables ..........................................................76
4.3.3. Policy-based Routing Rules ...........................................................76
4.3.4. Policy-based Routing Table Selection ..............................................77
4.3.5. The Ordering parameter ................................................................77
4.4. Dynamic Routing ...................................................................................80
4.4.1. Dynamic Routing overview ...........................................................80
4.4.2. OSPF ........................................................................................81
4.4.3. Dynamic Routing Policy ...............................................................84
4.5. Transparent Mode ..................................................................................88
4.5.1. Overview of Transparent Mode ......................................................88
4.5.2. Comparison with Routing mode .....................................................88
4.5.3. Transparent Mode implementation ..................................................88
4.5.4. Enabling Transparent Mode ...........................................................89
4.5.5. Transparent Mode example scenarios ..............................................89
5. DHCP Services ................................................................................................96
5.1. Overview ..............................................................................................96
5.2. DHCP Servers .......................................................................................97
5.3. Static DHCP Assignment .........................................................................99
5.4. DHCP Relaying ................................................................................... 100
6. Security Mechanisms ....................................................................................... 102
6.1. Access Rules ....................................................................................... 102
6.1.1. Introduction .............................................................................. 102
6.1.2. IP spoofing ............................................................................... 102
6.1.3. Access Rule Settings .................................................................. 103
6.2. Application Layer Gateways ................................................................... 105
6.2.1. Overview ................................................................................. 105
6.2.2. Hyper Text Transfer Protocol ....................................................... 105
6.2.3. File Transfer Protocol ................................................................. 105
6.2.4. Simple Mail Transfer Protocol ...................................................... 110
6.3. Intrusion Detection and Prevention .......................................................... 125
6.3.1. Overview ................................................................................. 125
6.3.2. IDP Availability in D-Link Models ............................................... 125
6.3.3. IDP Rules ................................................................................. 126
6.3.4. Insertion/Evasion Attack Prevention .............................................. 127
6.3.5. IDP Pattern Matching ................................................................. 128
6.3.6. IDP Signature Groups ................................................................. 129
v
User Manual

Advertisement

Table of Contents
loading

Table of Contents