D-Link 210 Network Router User Manual


 
4.14. IGMP - No Address Translation .................................................................... 201
4.15. if1 Configuration ........................................................................................ 202
4.16. if2 Configuration - Group Translation ............................................................. 203
4.17. Setting up Transparent Mode for Scenario 1 .................................................... 214
4.18. Setting up Transparent Mode for Scenario 2 .................................................... 215
5.1. Setting up a DHCP server .............................................................................. 225
5.2. Checking DHCP Server Status ........................................................................ 226
5.3. Static DHCP Host Assignment ........................................................................ 228
5.4. Setting up a DHCP Relayer ............................................................................ 230
5.5. Creating an IP Pool ....................................................................................... 235
6.1. Setting up an Access Rule .............................................................................. 239
6.2. Protecting an FTP Server with an ALG ............................................................. 248
6.3. Protecting FTP Clients .................................................................................. 251
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 277
6.5. H.323 with private IP addresses ...................................................................... 279
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 280
6.7. Using Private IP Addresses ............................................................................ 281
6.8. H.323 with Gatekeeper .................................................................................. 282
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 284
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 285
6.11. Configuring remote offices for H.323 ............................................................. 288
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 288
6.13. Stripping ActiveX and Java applets ................................................................ 293
6.14. Setting up a white and blacklist ..................................................................... 294
6.15. Enabling Dynamic Web Content Filtering ....................................................... 297
6.16. Enabling Audit Mode .................................................................................. 299
6.17. Reclassifying a blocked site .......................................................................... 300
6.18. Editing Content Filtering HTTP Banner Files ................................................... 307
6.19. Activating Anti-Virus Scanning ..................................................................... 313
6.20. Configuring an SMTP Log Receiver .............................................................. 323
6.21. Setting up IDP for a Mail Server .................................................................... 323
6.22. Adding a Host to the Whitelist ...................................................................... 332
7.1. Adding a NAT Rule ...................................................................................... 337
7.2. Using NAT Pools ......................................................................................... 341
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 344
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 346
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 348
8.1. Creating an Authentication User Group ............................................................ 371
8.2. User Authentication Setup for Web Access ....................................................... 371
8.3. Configuring a RADIUS Server ....................................................................... 372
8.4. Editing Content Filtering HTTP Banner Files .................................................... 374
9.1. Using an Algorithm Proposal List .................................................................... 401
9.2. Using a Pre-Shared key ................................................................................. 402
9.3. Using an Identity List .................................................................................... 404
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 409
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 409
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients ................. 411
9.7. Setting Up Config Mode ................................................................................ 412
9.8. Using Config Mode with IPsec Tunnels ............................................................ 413
9.9. Setting up an LDAP server ............................................................................. 413
9.10. Setting up a PPTP server .............................................................................. 426
9.11. Setting up an L2TP server ............................................................................ 427
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 427
10.1. Applying a Simple Bandwidth Limit .............................................................. 447
10.2. Limiting Bandwidth in Both Directions ........................................................... 449
10.3. Setting up SLB ........................................................................................... 478
12.1. A simple ZoneDefense scenario .................................................................... 500
User Manual
13