D-Link DFL-800 Инструкция по эксплуатации онлайн [13/552] 17547

D-Link DFL-800 Инструкция по эксплуатации онлайн [13/552] 17547
4.14. IGMP - No Address Translation ....................................................................206
4.15. if1 Configuration ........................................................................................207
4.16. if2 Configuration - Group Translation .............................................................208
4.17. Setting up Transparent Mode for Scenario 1 ....................................................219
4.18. Setting up Transparent Mode for Scenario 2 ....................................................220
5.1. Setting up a DHCP server ..............................................................................230
5.2. Checking DHCP Server Status ........................................................................231
5.3. Static DHCP Host Assignment ........................................................................233
5.4. Setting up a DHCP Relayer ............................................................................235
5.5. Creating an IP Pool .......................................................................................240
6.1. Setting up an Access Rule .............................................................................. 244
6.2. Protecting an FTP Server with an ALG .............................................................253
6.3. Protecting FTP Clients .................................................................................. 256
6.4. Protecting Phones Behind NetDefend Firewalls ..................................................282
6.5. H.323 with private IP addresses ......................................................................284
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 285
6.7. Using Private IP Addresses ............................................................................ 286
6.8. H.323 with Gatekeeper ..................................................................................287
6.9. H.323 with Gatekeeper and two NetDefend Firewalls ..........................................289
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 290
6.11. Configuring remote offices for H.323 .............................................................293
6.12. Allowing the H.323 Gateway to register with the Gatekeeper ..............................293
6.13. Stripping ActiveX and Java applets ................................................................298
6.14. Setting up a white and blacklist .....................................................................299
6.15. Enabling Dynamic Web Content Filtering .......................................................302
6.16. Enabling Audit Mode ..................................................................................304
6.17. Reclassifying a blocked site .......................................................................... 305
6.18. Editing Content Filtering HTTP Banner Files ................................................... 312
6.19. Activating Anti-Virus Scanning ..................................................................... 318
6.20. Configuring an SMTP Log Receiver ..............................................................328
6.21. Setting up IDP for a Mail Server ....................................................................329
6.22. Adding a Host to the Whitelist ......................................................................338
7.1. Adding a NAT Rule ......................................................................................343
7.2. Using NAT Pools .........................................................................................347
7.3. Enabling Traffic to a Protected Web Server in a DMZ .........................................350
7.4. Enabling Traffic to a Web Server on an Internal Network ....................................352
7.5. Translating Traffic to Multiple Protected Web Servers ........................................354
8.1. Creating an Authentication User Group ............................................................ 377
8.2. User Authentication Setup for Web Access .......................................................377
8.3. Configuring a RADIUS Server .......................................................................378
8.4. Editing Content Filtering HTTP Banner Files ....................................................380
9.1. Using an Algorithm Proposal List ....................................................................407
9.2. Using a Pre-Shared key ................................................................................. 408
9.3. Using an Identity List .................................................................................... 409
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 415
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 415
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients .................417
9.7. Setting Up Config Mode ................................................................................418
9.8. Using Config Mode with IPsec Tunnels ............................................................419
9.9. Setting up an LDAP server .............................................................................419
9.10. Setting up a PPTP server ..............................................................................432
9.11. Setting up an L2TP server ............................................................................ 433
9.12. Setting up an L2TP Tunnel Over IPsec ...........................................................433
10.1. Applying a Simple Bandwidth Limit .............................................................. 454
10.2. Limiting Bandwidth in Both Directions ........................................................... 456
10.3. Setting up SLB ...........................................................................................485
12.1. A simple ZoneDefense scenario ....................................................................507
User Manual
13

Содержание

Скачать