4.10. Add an
OSPF Area
.....................................................................................
217
4.11. Add
OSPF Interface
Objects
.........................................................................
217
4.12. Import Routes from an OSPF AS into the Main Routing Table
............................
218
4.13. Exporting the Default Route into an OSPF AS
.................................................
218
4.14. Forwarding of Multicast Traffic using the SAT Multiplex Rule
...........................
222
4.15. Multicast Forwarding - Address Translation
....................................................
224
4.16. IGMP - No Address Translation
....................................................................
227
4.17.
if1
Configuration
........................................................................................
228
4.18.
if2
Configuration - Group Translation
.............................................................
229
4.19. Setting up Transparent Mode for Scenario 1
....................................................
240
4.20. Setting up Transparent Mode for Scenario 2
....................................................
241
5.1. Setting up a DHCP server
..............................................................................
251
5.2. Static DHCP Host Assignment
........................................................................
254
5.3. Setting up a DHCP Relayer
............................................................................
256
5.4. Creating an IP Pool
.......................................................................................
261
6.1. Setting up an Access Rule
..............................................................................
265
6.2. Protecting an FTP Server with an ALG
.............................................................
274
6.3. Protecting FTP Clients
..................................................................................
277
6.4. Protecting Phones Behind NetDefend Firewalls
..................................................
305
6.5. H.323 with Private IPv4 Addresses
..................................................................
306
6.6. Two Phones Behind Different NetDefend Firewalls
............................................
307
6.7. Using Private IPv4 Addresses
.........................................................................
308
6.8. H.323 with Gatekeeper
..................................................................................
309
6.9. H.323 with Gatekeeper and two NetDefend Firewalls
..........................................
311
6.10. Using the H.323 ALG in a Corporate Environment
...........................................
312
6.11. Configuring remote offices for H.323
.............................................................
315
6.12. Allowing the H.323 Gateway to register with the Gatekeeper
..............................
315
6.13. Stripping ActiveX and Java applets
................................................................
320
6.14. Setting up a white and blacklist
.....................................................................
321
6.15. Enabling Dynamic Web Content Filtering
.......................................................
324
6.16. Enabling Audit Mode
..................................................................................
326
6.17. Reclassifying a blocked site
..........................................................................
327
6.18. Editing Content Filtering HTTP Banner Files
...................................................
334
6.19. Activating Anti-Virus Scanning
.....................................................................
341
6.20. Configuring an SMTP Log Receiver
..............................................................
351
6.21. Setting up IDP for a Mail Server
....................................................................
352
6.22. Adding a Host to the Whitelist
......................................................................
361
7.1. Specifying a
NAT
Rule
..................................................................................
366
7.2. Using NAT Pools
.........................................................................................
370
7.3. Enabling Traffic to a Protected Web Server in a DMZ
.........................................
373
7.4. Enabling Traffic to a Web Server on an Internal Network
....................................
375
7.5. Translating Traffic to Multiple Protected Web Servers
........................................
377
7.6. Translating Traffic to a Single Protected Web Server (N:1)
..................................
380
8.1. Creating an Authentication User Group
............................................................
402
8.2. User Authentication Setup for Web Access
.......................................................
402
8.3. Configuring a RADIUS Server
.......................................................................
403
8.4. Editing Content Filtering HTTP Banner Files
....................................................
405
9.1. Using an Algorithm Proposal List
....................................................................
433
9.2. Using a Pre-Shared key
.................................................................................
434
9.3. Using an Identity List
....................................................................................
436
9.4. Setting up a PSK based VPN tunnel for roaming clients
.......................................
441
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients
...............
441
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients
.................
443
9.7. Setting Up Config Mode
................................................................................
445
9.8. Using Config Mode with IPsec Tunnels
............................................................
445
9.9. Setting up an LDAP server
.............................................................................
446
9.10. Setting up a PPTP server
..............................................................................
458
9.11. Setting up an L2TP server
............................................................................
459
9.12. Setting up an L2TP Tunnel Over IPsec
...........................................................
459
9.13. Setting Up an SSL VPN Interface
..................................................................
472
10.1. Applying a Simple Bandwidth Limit
..............................................................
488
10.2. Limiting Bandwidth in Both Directions
...........................................................
490
User Manual
13