3.5. The IP Rule-Set .....................................................................................52
3.5.1. Overview ...................................................................................52
3.6. Schedules .............................................................................................55
3.7.1. Overview ...................................................................................57
3.7.3. Validity Time ..............................................................................57
3.8.2. Time Servers ..............................................................................60
3.9. DNS Lookup .........................................................................................64
4. Routing ...........................................................................................................66
4.1. Overview ..............................................................................................66
4.2. Static Routing ........................................................................................67
4.2.3. Proxy ARP .................................................................................75
4.3.1. Overview ...................................................................................76
4.4. Dynamic Routing ...................................................................................80
4.4.2. OSPF ........................................................................................81
4.5. Transparent Mode ..................................................................................88
5. DHCP Services ................................................................................................96
5.1. Overview ..............................................................................................96
5.2. DHCP Servers .......................................................................................97
5.4. DHCP Relaying ................................................................................... 100
6. Security Mechanisms ....................................................................................... 102
6.1. Access Rules ....................................................................................... 102
6.1.1. Introduction .............................................................................. 102
6.1.2. IP spoofing ............................................................................... 102
6.2.1. Overview ................................................................................. 105
6.3.1. Overview ................................................................................. 125
6.3.3. IDP Rules ................................................................................. 126
v
User Manual