4.7. Transparent Mode ................................................................................ 212
4.7.1. Overview ................................................................................. 212
4.7.2. Enabling Internet Access ............................................................. 217
4.7.3. Transparent Mode Scenarios ........................................................ 218
4.7.4. Spanning Tree BPDU Support ...................................................... 222
4.7.5. Advanced Settings for Transparent Mode ....................................... 223
5. DHCP Services .............................................................................................. 228
5.1. Overview ............................................................................................ 228
5.2. DHCP Servers ..................................................................................... 229
5.2.1. Static DHCP Hosts ..................................................................... 232
5.2.2. Custom Options ......................................................................... 233
5.3. DHCP Relaying ................................................................................... 235
5.3.1. DHCP Relay Advanced Settings ................................................... 236
5.4. IP Pools .............................................................................................. 238
6. Security Mechanisms ....................................................................................... 242
6.1. Access Rules ....................................................................................... 242
6.1.1. Overview ................................................................................. 242
6.1.2. IP Spoofing .............................................................................. 243
6.1.3. Access Rule Settings .................................................................. 243
6.2. ALGs ................................................................................................. 245
6.2.1. Overview ................................................................................. 245
6.2.2. The HTTP ALG ........................................................................ 246
6.2.3. The FTP ALG ........................................................................... 249
6.2.4. The TFTP ALG ......................................................................... 258
6.2.5. The SMTP ALG ........................................................................ 259
6.2.6. The POP3 ALG ......................................................................... 268
6.2.7. The PPTP ALG ......................................................................... 269
6.2.8. The SIP ALG ............................................................................ 270
6.2.9. The H.323 ALG ........................................................................ 280
6.2.10. The TLS ALG ......................................................................... 294
6.3. Web Content Filtering ........................................................................... 297
6.3.1. Overview ................................................................................. 297
6.3.2. Active Content Handling ............................................................. 297
6.3.3. Static Content Filtering ............................................................... 298
6.3.4. Dynamic Web Content Filtering ................................................... 300
6.4. Anti-Virus Scanning ............................................................................. 314
6.4.1. Overview ................................................................................. 314
6.4.2. Implementation ......................................................................... 314
6.4.3. Activating Anti-Virus Scanning .................................................... 315
6.4.4. The Signature Database .............................................................. 316
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 316
6.4.6. Anti-Virus Options ..................................................................... 316
6.5. Intrusion Detection and Prevention .......................................................... 320
6.5.1. Overview ................................................................................. 320
6.5.2. IDP Availability for D-Link Models .............................................. 320
6.5.3. IDP Rules ................................................................................. 322
6.5.4. Insertion/Evasion Attack Prevention .............................................. 324
6.5.5. IDP Pattern Matching ................................................................. 325
6.5.6. IDP Signature Groups ................................................................. 326
6.5.7. IDP Actions .............................................................................. 327
6.5.8. SMTP Log Receiver for IDP Events .............................................. 328
6.6. Denial-of-Service Attack Prevention ........................................................ 332
6.6.1. Overview ................................................................................. 332
6.6.2. DoS Attack Mechanisms ............................................................. 332
6.6.3. Ping of Death and Jolt Attacks ..................................................... 332
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ...... 333
6.6.5. The Land and LaTierra attacks ..................................................... 333
6.6.6. The WinNuke attack ................................................................... 333
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ........................... 334
6.6.8. TCP SYN Flood Attacks ............................................................. 335
6.6.9. The Jolt2 Attack ........................................................................ 335
6.6.10. Distributed DoS Attacks ............................................................ 335
6.7. Blacklisting Hosts and Networks ............................................................. 337
User Manual
6
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...