D-Link 2560G Network Router User Manual


 
4.7. Transparent Mode ................................................................................ 207
4.7.1. Overview ................................................................................. 207
4.7.2. Enabling Internet Access ............................................................. 211
4.7.3. Transparent Mode Scenarios ........................................................ 213
4.7.4. Spanning Tree BPDU Support ...................................................... 217
4.7.5. Advanced Settings for Transparent Mode ....................................... 218
5. DHCP Services .............................................................................................. 223
5.1. Overview ............................................................................................ 223
5.2. DHCP Servers ..................................................................................... 224
5.2.1. Static DHCP Hosts ..................................................................... 227
5.2.2. Custom Options ......................................................................... 228
5.3. DHCP Relaying ................................................................................... 230
5.3.1. DHCP Relay Advanced Settings ................................................... 231
5.4. IP Pools .............................................................................................. 233
6. Security Mechanisms ....................................................................................... 237
6.1. Access Rules ....................................................................................... 237
6.1.1. Overview ................................................................................. 237
6.1.2. IP Spoofing .............................................................................. 238
6.1.3. Access Rule Settings .................................................................. 238
6.2. ALGs ................................................................................................. 240
6.2.1. Overview ................................................................................. 240
6.2.2. The HTTP ALG ........................................................................ 241
6.2.3. The FTP ALG ........................................................................... 244
6.2.4. The TFTP ALG ......................................................................... 253
6.2.5. The SMTP ALG ........................................................................ 254
6.2.6. The POP3 ALG ......................................................................... 263
6.2.7. The PPTP ALG ......................................................................... 264
6.2.8. The SIP ALG ............................................................................ 265
6.2.9. The H.323 ALG ........................................................................ 275
6.2.10. The TLS ALG ......................................................................... 289
6.3. Web Content Filtering ........................................................................... 292
6.3.1. Overview ................................................................................. 292
6.3.2. Active Content Handling ............................................................. 292
6.3.3. Static Content Filtering ............................................................... 293
6.3.4. Dynamic Web Content Filtering ................................................... 295
6.4. Anti-Virus Scanning ............................................................................. 309
6.4.1. Overview ................................................................................. 309
6.4.2. Implementation ......................................................................... 309
6.4.3. Activating Anti-Virus Scanning .................................................... 310
6.4.4. The Signature Database .............................................................. 311
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 311
6.4.6. Anti-Virus Options ..................................................................... 311
6.5. Intrusion Detection and Prevention .......................................................... 315
6.5.1. Overview ................................................................................. 315
6.5.2. IDP Availability for D-Link Models .............................................. 315
6.5.3. IDP Rules ................................................................................. 317
6.5.4. Insertion/Evasion Attack Prevention .............................................. 318
6.5.5. IDP Pattern Matching ................................................................. 319
6.5.6. IDP Signature Groups ................................................................. 320
6.5.7. IDP Actions .............................................................................. 322
6.5.8. SMTP Log Receiver for IDP Events .............................................. 322
6.6. Denial-of-Service Attack Prevention ........................................................ 326
6.6.1. Overview ................................................................................. 326
6.6.2. DoS Attack Mechanisms ............................................................. 326
6.6.3. Ping of Death and Jolt Attacks ..................................................... 326
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ...... 327
6.6.5. The Land and LaTierra attacks ..................................................... 327
6.6.6. The WinNuke attack ................................................................... 327
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ........................... 328
6.6.8. TCP SYN Flood Attacks ............................................................. 329
6.6.9. The Jolt2 Attack ........................................................................ 329
6.6.10. Distributed DoS Attacks ............................................................ 329
6.7. Blacklisting Hosts and Networks ............................................................. 331
User Manual
6