D-Link 210 Network Router User Manual


 
List of Figures
1.1. Packet Flow Schematic Part I ...........................................................................23
1.2. Packet Flow Schematic Part II ..........................................................................24
1.3. Packet Flow Schematic Part III .........................................................................25
1.4. Expanded Apply Rules Logic ............................................................................26
3.1. VLAN Connections ........................................................................................99
3.2. An ARP Publish Ethernet Frame ..................................................................... 112
3.3. Simplified NetDefendOS Traffic Flow ............................................................. 118
4.1. A Typical Routing Scenario ........................................................................... 144
4.2. Using Local IP Address with an Unbound Network ............................................ 146
4.3. A Route Failover Scenario for ISP Access ......................................................... 152
4.4. A Proxy ARP Example .................................................................................. 158
4.5. The RLB Round Robin Algorithm ................................................................... 166
4.6. The RLB Spillover Algorithm ......................................................................... 167
4.7. A Route Load Balancing Scenario ................................................................... 169
4.8. A Simple OSPF Scenario ............................................................................... 172
4.9. OSPF Providing Route Redundancy ................................................................. 173
4.10. Virtual Links Connecting Areas .................................................................... 177
4.11. Virtual Links with Partitioned Backbone ......................................................... 178
4.12. NetDefendOS OSPF Objects ........................................................................ 179
4.13. Dynamic Routing Rule Objects ..................................................................... 186
4.14. Multicast Forwarding - No Address Translation ................................................ 196
4.15. Multicast Forwarding - Address Translation .................................................... 198
4.16. Multicast Snoop Mode ................................................................................. 200
4.17. Multicast Proxy Mode ................................................................................. 200
4.18. Non-transparent Mode Internet Access ........................................................... 212
4.19. Transparent Mode Internet Access ................................................................. 212
4.20. Transparent Mode Scenario 1 ........................................................................ 214
4.21. Transparent Mode Scenario 2 ........................................................................ 215
4.22. An Example BPDU Relaying Scenario ........................................................... 218
5.1. DHCP Server Objects ................................................................................... 227
6.1. Deploying an ALG ....................................................................................... 240
6.2. HTTP ALG Processing Order ......................................................................... 243
6.3. FTP ALG Hybrid Mode ................................................................................. 245
6.4. SMTP ALG Processing Order ......................................................................... 256
6.5. Anti-Spam Filtering ...................................................................................... 258
6.6. PPTP ALG Usage ........................................................................................ 264
6.7. TLS Termination .......................................................................................... 290
6.8. Dynamic Content Filtering Flow ..................................................................... 296
6.9. IDP Database Updating ................................................................................. 316
7.1. NAT IP Address Translation .......................................................................... 335
7.2. A NAT Example .......................................................................................... 337
7.3. Anonymizing with NAT ................................................................................ 339
7.4. The Role of the DMZ .................................................................................... 344
8.1. Normal LDAP Authentication ........................................................................ 365
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 .................................. 366
9.1. The AH protocol .......................................................................................... 399
9.2. The ESP protocol ......................................................................................... 399
9.3. PPTP Client Usage ....................................................................................... 433
9.4. Certificate Validation Components .................................................................. 435
10.1. Pipe Rules Determine Pipe Usage .................................................................. 446
10.2. FwdFast Rules Bypass Traffic Shaping ........................................................... 447
10.3. Differentiated Limits Using Chains ................................................................ 450
10.4. The Eight Pipe Precedences .......................................................................... 451
10.5. Minimum and Maximum Pipe Precedence ....................................................... 453
10.6. Traffic Grouped By IP Address ..................................................................... 457
10.7. A Basic Traffic Shaping Scenario .................................................................. 460
10.8. IDP Traffic Shaping P2P Scenario ................................................................. 467
10.9. A Server Load Balancing Configuration .......................................................... 473
10