4.14. IGMP - No Address Translation .................................................................... 206
4.15. if1 Configuration ........................................................................................ 207
4.16. if2 Configuration - Group Translation ............................................................. 208
4.17. Setting up Transparent Mode for Scenario 1 .................................................... 219
4.18. Setting up Transparent Mode for Scenario 2 .................................................... 220
5.1. Setting up a DHCP server .............................................................................. 230
5.2. Checking DHCP Server Status ........................................................................ 231
5.3. Static DHCP Host Assignment ........................................................................ 233
5.4. Setting up a DHCP Relayer ............................................................................ 235
5.5. Creating an IP Pool ....................................................................................... 240
6.1. Setting up an Access Rule .............................................................................. 244
6.2. Protecting an FTP Server with an ALG ............................................................. 253
6.3. Protecting FTP Clients .................................................................................. 256
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 282
6.5. H.323 with private IP addresses ...................................................................... 284
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 285
6.7. Using Private IP Addresses ............................................................................ 286
6.8. H.323 with Gatekeeper .................................................................................. 287
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 289
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 290
6.11. Configuring remote offices for H.323 ............................................................. 293
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 293
6.13. Stripping ActiveX and Java applets ................................................................ 298
6.14. Setting up a white and blacklist ..................................................................... 299
6.15. Enabling Dynamic Web Content Filtering ....................................................... 302
6.16. Enabling Audit Mode .................................................................................. 304
6.17. Reclassifying a blocked site .......................................................................... 305
6.18. Editing Content Filtering HTTP Banner Files ................................................... 312
6.19. Activating Anti-Virus Scanning ..................................................................... 318
6.20. Configuring an SMTP Log Receiver .............................................................. 328
6.21. Setting up IDP for a Mail Server .................................................................... 329
6.22. Adding a Host to the Whitelist ...................................................................... 338
7.1. Adding a NAT Rule ...................................................................................... 343
7.2. Using NAT Pools ......................................................................................... 347
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 350
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 352
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 354
8.1. Creating an Authentication User Group ............................................................ 377
8.2. User Authentication Setup for Web Access ....................................................... 377
8.3. Configuring a RADIUS Server ....................................................................... 378
8.4. Editing Content Filtering HTTP Banner Files .................................................... 380
9.1. Using an Algorithm Proposal List .................................................................... 407
9.2. Using a Pre-Shared key ................................................................................. 408
9.3. Using an Identity List .................................................................................... 409
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 415
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 415
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients ................. 417
9.7. Setting Up Config Mode ................................................................................ 418
9.8. Using Config Mode with IPsec Tunnels ............................................................ 419
9.9. Setting up an LDAP server ............................................................................. 419
9.10. Setting up a PPTP server .............................................................................. 432
9.11. Setting up an L2TP server ............................................................................ 433
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 433
10.1. Applying a Simple Bandwidth Limit .............................................................. 454
10.2. Limiting Bandwidth in Both Directions ........................................................... 456
10.3. Setting up SLB ........................................................................................... 485
12.1. A simple ZoneDefense scenario .................................................................... 507
User Manual
13
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...