List of Figures
1.1. Packet Flow Schematic Part I ...........................................................................23
1.2. Packet Flow Schematic Part II ..........................................................................24
1.3. Packet Flow Schematic Part III .........................................................................25
1.4. Expanded Apply Rules Logic ............................................................................26
3.1. VLAN Connections ...................................................................................... 103
3.2. An ARP Publish Ethernet Frame ..................................................................... 116
3.3. Simplified NetDefendOS Traffic Flow ............................................................. 123
4.1. A Typical Routing Scenario ........................................................................... 149
4.2. Using Local IP Address with an Unbound Network ............................................ 151
4.3. A Route Failover Scenario for ISP Access ......................................................... 157
4.4. A Proxy ARP Example .................................................................................. 163
4.5. The RLB Round Robin Algorithm ................................................................... 171
4.6. The RLB Spillover Algorithm ......................................................................... 172
4.7. A Route Load Balancing Scenario ................................................................... 174
4.8. A Simple OSPF Scenario ............................................................................... 177
4.9. OSPF Providing Route Redundancy ................................................................. 178
4.10. Virtual Links Connecting Areas .................................................................... 182
4.11. Virtual Links with Partitioned Backbone ......................................................... 183
4.12. NetDefendOS OSPF Objects ........................................................................ 184
4.13. Dynamic Routing Rule Objects ..................................................................... 191
4.14. Multicast Forwarding - No Address Translation ................................................ 201
4.15. Multicast Forwarding - Address Translation .................................................... 203
4.16. Multicast Snoop Mode ................................................................................. 205
4.17. Multicast Proxy Mode ................................................................................. 205
4.18. Non-transparent Mode Internet Access ........................................................... 217
4.19. Transparent Mode Internet Access ................................................................. 217
4.20. Transparent Mode Scenario 1 ........................................................................ 219
4.21. Transparent Mode Scenario 2 ........................................................................ 220
4.22. An Example BPDU Relaying Scenario ........................................................... 223
5.1. DHCP Server Objects ................................................................................... 232
6.1. Deploying an ALG ....................................................................................... 245
6.2. HTTP ALG Processing Order ......................................................................... 248
6.3. FTP ALG Hybrid Mode ................................................................................. 250
6.4. SMTP ALG Processing Order ......................................................................... 261
6.5. Anti-Spam Filtering ...................................................................................... 263
6.6. PPTP ALG Usage ........................................................................................ 269
6.7. TLS Termination .......................................................................................... 295
6.8. Dynamic Content Filtering Flow ..................................................................... 301
6.9. IDP Database Updating ................................................................................. 321
6.10. IDP Signature Selection ............................................................................... 323
7.1. NAT IP Address Translation .......................................................................... 341
7.2. A NAT Example .......................................................................................... 343
7.3. Anonymizing with NAT ................................................................................ 345
7.4. The Role of the DMZ .................................................................................... 350
8.1. Normal LDAP Authentication ........................................................................ 371
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 .................................. 372
9.1. The AH protocol .......................................................................................... 405
9.2. The ESP protocol ......................................................................................... 405
9.3. PPTP Client Usage ....................................................................................... 439
9.4. Certificate Validation Components .................................................................. 441
10.1. Pipe Rules Determine Pipe Usage .................................................................. 453
10.2. FwdFast Rules Bypass Traffic Shaping ........................................................... 454
10.3. Differentiated Limits Using Chains ................................................................ 457
10.4. The Eight Pipe Precedences .......................................................................... 458
10.5. Minimum and Maximum Pipe Precedence ....................................................... 460
10.6. Traffic Grouped By IP Address ..................................................................... 464
10.7. A Basic Traffic Shaping Scenario .................................................................. 467
10.8. IDP Traffic Shaping P2P Scenario ................................................................. 474
10
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...