List of Figures
1.1. Packet Flow Schematic Part I
...........................................................................
23
1.2. Packet Flow Schematic Part II
..........................................................................
24
1.3. Packet Flow Schematic Part III
.........................................................................
25
1.4. Expanded
Apply Rules
Logic
............................................................................
26
3.1. VLAN Connections
........................................................................................
99
3.2. An ARP Publish Ethernet Frame
.....................................................................
112
3.3. Simplified NetDefendOS Traffic Flow
.............................................................
118
4.1. A Typical Routing Scenario
...........................................................................
144
4.2. Using
Local IP Address
with an Unbound Network
............................................
146
4.3. A Route Failover Scenario for ISP Access
.........................................................
152
4.4. A Proxy ARP Example
..................................................................................
158
4.5. The RLB Round Robin Algorithm
...................................................................
166
4.6. The RLB Spillover Algorithm
.........................................................................
167
4.7. A Route Load Balancing Scenario
...................................................................
169
4.8. A Simple OSPF Scenario
...............................................................................
172
4.9. OSPF Providing Route Redundancy
.................................................................
173
4.10. Virtual Links Connecting Areas
....................................................................
177
4.11. Virtual Links with Partitioned Backbone
.........................................................
178
4.12. NetDefendOS OSPF Objects
........................................................................
179
4.13. Dynamic Routing Rule Objects
.....................................................................
186
4.14. Multicast Forwarding - No Address Translation
................................................
196
4.15. Multicast Forwarding - Address Translation
....................................................
198
4.16. Multicast Snoop Mode
.................................................................................
200
4.17. Multicast Proxy Mode
.................................................................................
200
4.18. Non-transparent Mode Internet Access
...........................................................
212
4.19. Transparent Mode Internet Access
.................................................................
212
4.20. Transparent Mode Scenario 1
........................................................................
214
4.21. Transparent Mode Scenario 2
........................................................................
215
4.22. An Example BPDU Relaying Scenario
...........................................................
218
5.1. DHCP Server Objects
...................................................................................
227
6.1. Deploying an ALG
.......................................................................................
240
6.2. HTTP ALG Processing Order
.........................................................................
243
6.3. FTP ALG Hybrid Mode
.................................................................................
245
6.4. SMTP ALG Processing Order
.........................................................................
256
6.5. Anti-Spam Filtering
......................................................................................
258
6.6. PPTP ALG Usage
........................................................................................
264
6.7. TLS Termination
..........................................................................................
290
6.8. Dynamic Content Filtering Flow
.....................................................................
296
6.9. IDP Database Updating
.................................................................................
316
7.1. NAT IP Address Translation
..........................................................................
335
7.2. A NAT Example
..........................................................................................
337
7.3. Anonymizing with NAT
................................................................................
339
7.4. The Role of the DMZ
....................................................................................
344
8.1. Normal LDAP Authentication
........................................................................
365
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2
..................................
366
9.1. The AH protocol
..........................................................................................
399
9.2. The ESP protocol
.........................................................................................
399
9.3. PPTP Client Usage
.......................................................................................
433
9.4. Certificate Validation Components
..................................................................
435
10.1. Pipe Rules Determine Pipe Usage
..................................................................
446
10.2.
FwdFast
Rules Bypass Traffic Shaping
...........................................................
447
10.3. Differentiated Limits Using Chains
................................................................
450
10.4. The Eight Pipe Precedences
..........................................................................
451
10.5. Minimum and Maximum Pipe Precedence
.......................................................
453
10.6. Traffic Grouped By IP Address
.....................................................................
457
10.7. A Basic Traffic Shaping Scenario
..................................................................
460
10.8. IDP Traffic Shaping P2P Scenario
.................................................................
467
10.9. A Server Load Balancing Configuration
..........................................................
473
10