beautypg.com

D-Link DFL-2500 User Manual

Page 11

background image

5.1. Setting up a DHCP server .............................................................................. 128
5.2. Checking the status of a DHCP server .............................................................. 129
5.3. Setting up Static DHCP ................................................................................. 130
5.4. Setting up a DHCP relayer ............................................................................. 131
5.5. Creating an IP Pool ....................................................................................... 133
6.1. Setting up an Access Rule .............................................................................. 137
6.2. Protecting an FTP Server with an ALG ............................................................. 141
6.3. Protecting FTP Clients .................................................................................. 144
6.4. Protecting Phones Behind D-Link Firewalls ...................................................... 157
6.5. H.323 with private IP addresses ...................................................................... 159
6.6. Two Phones Behind Different D-Link Firewalls ................................................. 160
6.7. Using Private IP Addresses ............................................................................ 161
6.8. H.323 with Gatekeeper .................................................................................. 162
6.9. H.323 with Gatekeeper and two D-Link Firewalls .............................................. 164
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 165
6.11. Configuring remote offices for H.323 ............................................................. 167
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 167
6.13. Stripping ActiveX and Java applets ................................................................ 170
6.14. Setting up a white and blacklist ..................................................................... 171
6.15. Enabling Dynamic Web Content Filtering ....................................................... 173
6.16. Enabling Audit Mode .................................................................................. 174
6.17. Reclassifying a blocked site .......................................................................... 176
6.18. Activating Anti-Virus Scanning ..................................................................... 186
6.19. Configuring an SMTP Log Receiver .............................................................. 194
6.20. Setting up IDP for a Mail Server .................................................................... 195
7.1. Adding a NAT rule ....................................................................................... 205
7.2. Using NAT Pools ......................................................................................... 208
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 210
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 212
7.5. Translating Traffic to Multiple Protected Web Servers ........................................ 214
8.1. Creating an authentication user group ............................................................... 226
8.2. User Authentication Setup for Web Access. ....................................................... 226
8.3. Configuring a RADIUS server. ....................................................................... 227
9.1. Using a Proposal List .................................................................................... 249
9.2. Using a Pre-Shared key ................................................................................. 250
9.3. Using an Identity List .................................................................................... 251
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 254
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ............... 255
9.6. Setting up a CA Server issued Certificate based VPN tunnel for roaming clients ....... 256
9.7. Setting Up Config Mode ................................................................................ 258
9.8. Using Config Mode with IPsec Tunnels ............................................................ 258
9.9. Setting up an LDAP server ............................................................................. 259
9.10. Setting up a PPTP server .............................................................................. 260
9.11. Setting up an L2TP server ............................................................................ 261
9.12. Setting up an L2TP Tunnel ........................................................................... 262
10.1. Applying a Simple Bandwidth Limit .............................................................. 269
10.2. Limiting Bandwidth in Both Directions ........................................................... 270
10.3. Setting up SLB ........................................................................................... 285
12.1. A simple ZoneDefense scenario .................................................................... 301

User Manual

11