D-Link DFL-800 Инструкция по эксплуатации онлайн [6/552] 17547

D-Link DFL-800 Инструкция по эксплуатации онлайн [6/552] 17547
4.7. Transparent Mode ................................................................................212
4.7.1. Overview .................................................................................212
4.7.2. Enabling Internet Access .............................................................217
4.7.3. Transparent Mode Scenarios ........................................................218
4.7.4. Spanning Tree BPDU Support ......................................................222
4.7.5. Advanced Settings for Transparent Mode .......................................223
5. DHCP Services ..............................................................................................228
5.1. Overview ............................................................................................228
5.2. DHCP Servers .....................................................................................229
5.2.1. Static DHCP Hosts .....................................................................232
5.2.2. Custom Options ......................................................................... 233
5.3. DHCP Relaying ................................................................................... 235
5.3.1. DHCP Relay Advanced Settings ...................................................236
5.4. IP Pools .............................................................................................. 238
6. Security Mechanisms ....................................................................................... 242
6.1. Access Rules ....................................................................................... 242
6.1.1. Overview .................................................................................242
6.1.2. IP Spoofing ..............................................................................243
6.1.3. Access Rule Settings ..................................................................243
6.2. ALGs .................................................................................................245
6.2.1. Overview .................................................................................245
6.2.2. The HTTP ALG ........................................................................246
6.2.3. The FTP ALG ........................................................................... 249
6.2.4. The TFTP ALG .........................................................................258
6.2.5. The SMTP ALG ........................................................................259
6.2.6. The POP3 ALG .........................................................................268
6.2.7. The PPTP ALG .........................................................................269
6.2.8. The SIP ALG ............................................................................270
6.2.9. The H.323 ALG ........................................................................280
6.2.10. The TLS ALG .........................................................................294
6.3. Web Content Filtering ...........................................................................297
6.3.1. Overview .................................................................................297
6.3.2. Active Content Handling .............................................................297
6.3.3. Static Content Filtering ...............................................................298
6.3.4. Dynamic Web Content Filtering ...................................................300
6.4. Anti-Virus Scanning .............................................................................314
6.4.1. Overview .................................................................................314
6.4.2. Implementation .........................................................................314
6.4.3. Activating Anti-Virus Scanning .................................................... 315
6.4.4. The Signature Database ..............................................................316
6.4.5. Subscribing to the D-Link Anti-Virus Service .................................316
6.4.6. Anti-Virus Options .....................................................................316
6.5. Intrusion Detection and Prevention .......................................................... 320
6.5.1. Overview .................................................................................320
6.5.2. IDP Availability for D-Link Models ..............................................320
6.5.3. IDP Rules ................................................................................. 322
6.5.4. Insertion/Evasion Attack Prevention ..............................................324
6.5.5. IDP Pattern Matching ................................................................. 325
6.5.6. IDP Signature Groups .................................................................326
6.5.7. IDP Actions .............................................................................. 327
6.5.8. SMTP Log Receiver for IDP Events ..............................................328
6.6. Denial-of-Service Attack Prevention ........................................................ 332
6.6.1. Overview .................................................................................332
6.6.2. DoS Attack Mechanisms .............................................................332
6.6.3. Ping of Death and Jolt Attacks .....................................................332
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ......333
6.6.5. The Land and LaTierra attacks .....................................................333
6.6.6. The WinNuke attack ...................................................................333
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ...........................334
6.6.8. TCP SYN Flood Attacks ............................................................. 335
6.6.9. The Jolt2 Attack ........................................................................335
6.6.10. Distributed DoS Attacks ............................................................ 335
6.7. Blacklisting Hosts and Networks .............................................................337
User Manual
6

Содержание

Скачать