D-Link NetDefend DFL-210 User Manual page 6

Network security firewall ver. 1.05
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

6.3.7. IDP Actions .............................................................................. 131
6.3.8. SMTP Log Receiver for IDP Events .............................................. 131
6.4. Anti-Virus .......................................................................................... 135
6.4.1. Overview ................................................................................. 135
6.4.2. Implementation ......................................................................... 135
6.4.3. Activation ................................................................................ 136
6.4.4. The Signature Database .............................................................. 136
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 136
6.4.6. Anti-Virus Options ..................................................................... 137
6.5. Web Content Filtering ........................................................................... 140
6.5.1. Overview ................................................................................. 140
6.5.2. Active Content Handling ............................................................. 140
6.5.3. Static Content Filtering ............................................................... 141
6.5.4. Dynamic Content Filtering .......................................................... 143
6.6. Denial-Of-Service (DoS) Attacks ............................................................ 155
6.6.1. Overview ................................................................................. 155
6.6.2. DoS Attack Mechanisms ............................................................. 155
6.6.3. Ping of Death and Jolt Attacks ..................................................... 155
6.6.5. The Land and LaTierra attacks ..................................................... 156
6.6.6. The WinNuke attack ................................................................... 156
6.6.8. TCP SYN Flood Attacks ............................................................. 158
6.6.9. The Jolt2 Attack ........................................................................ 158
6.6.10. Distributed DoS Attacks ............................................................ 158
6.7. Blacklisting Hosts and Networks ............................................................. 159
7. Address Translation ........................................................................................ 161
7.1. Dynamic Address Translation (NAT) ....................................................... 161
7.1.1. Which Protocols can NAT handle? ................................................ 162
7.2. Static Address Translation (SAT) ............................................................ 164
7.2.1. Translation of a Single IP Address (1:1) ......................................... 164
7.2.2. Translation of Multiple IP Addresses (M:N) .................................... 167
7.2.3. All-to-One Mappings (N:1) ......................................................... 169
7.2.4. Port Translation ......................................................................... 170
7.2.5. Which Protocols can SAT handle? ................................................ 170
7.2.7. SAT and FwdFast Rules .............................................................. 171
8. User Authentication ........................................................................................ 174
8.1. Overview ............................................................................................ 174
8.1.1. Authentication Methods .............................................................. 174
8.1.2. Choosing Passwords ................................................................... 174
8.1.3. User Types ............................................................................... 175
8.2. Authentication Components ................................................................... 176
8.2.1. The Local User Database (UserDB) ............................................... 176
8.2.2. External Authentication Servers .................................................... 176
8.2.3. Authentication Agents ................................................................ 176
8.2.4. Authentication Rules .................................................................. 177
8.3. Authentication Process .......................................................................... 178
9. Virtual Private Networks .................................................................................. 181
9.1. VPN overview ..................................................................................... 181
9.1.1. The need for VPNs ..................................................................... 181
9.1.2. The basics of VPN Encryption ..................................................... 181
9.1.3. Planning a VPN ......................................................................... 181
9.2. IPsec .................................................................................................. 183
9.2.1. IPsec Basics .............................................................................. 183
9.2.2. Proposal Lists ........................................................................... 192
9.2.3. Pre-shared Keys ........................................................................ 193
9.2.4. Identification Lists ..................................................................... 193
9.3. IPsec Tunnels ...................................................................................... 196
9.3.1. Overview of IPsec tunnels ........................................................... 196
9.3.2. LAN to LAN tunnels with a Pre-shared Key ................................... 196
9.3.3. Roaming Clients ........................................................................ 196
9.3.4. Fetching CRLs from an alternate LDAP server ................................ 200
vi
User Manual

Advertisement

Table of Contents
loading

Table of Contents