D-Link DFL-800-AV-12 User Manual - Page 6

Ping of Death, Teardrop, Bonk, Boink and Nestea, LaTierra, WinNuke, Smurf, Papasmurf, Fraggle, Jolt2

Page 6 highlights

User Manual 6.2.8. H.323 155 6.3. Web Content Filtering 169 6.3.1. Overview 169 6.3.2. Active Content Handling 169 6.3.3. Static Content Filtering 170 6.3.4. Dynamic Web Content Filtering 172 6.4. Anti-Virus Scanning 183 6.4.1. Overview 183 6.4.2. Implementation 183 6.4.3. Activating Anti-Virus Scanning 184 6.4.4. The Signature Database 184 6.4.5. Subscribing to the D-Link Anti-Virus Service 184 6.4.6. Anti-Virus Options 184 6.5. Intrusion Detection and Prevention 188 6.5.1. Overview 188 6.5.2. IDP Availability in D-Link Models 188 6.5.3. IDP Rules 190 6.5.4. Insertion/Evasion Attack Prevention 191 6.5.5. IDP Pattern Matching 192 6.5.6. IDP Signature Groups 192 6.5.7. IDP Actions 194 6.5.8. SMTP Log Receiver for IDP Events 194 6.6. Denial-Of-Service (DoS) Attacks 198 6.6.1. Overview 198 6.6.2. DoS Attack Mechanisms 198 6.6.3. Ping of Death and Jolt Attacks 198 6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ...... 199 6.6.5. The Land and LaTierra attacks 199 6.6.6. The WinNuke attack 199 6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle 200 6.6.8. TCP SYN Flood Attacks 201 6.6.9. The Jolt2 Attack 201 6.6.10. Distributed DoS Attacks 201 6.7. Blacklisting Hosts and Networks 202 7. Address Translation 204 7.1. Dynamic Network Address Translation 204 7.2. NAT Pools 207 7.3. Static Address Translation 210 7.3.1. Translation of a Single IP Address (1:1 210 7.3.2. Translation of Multiple IP Addresses (M:N 213 7.3.3. All-to-One Mappings (N:1 215 7.3.4. Port Translation 216 7.3.5. Protocols handled by SAT 216 7.3.6. Multiple SAT rule matches 217 7.3.7. SAT and FwdFast Rules 217 8. User Authentication 220 8.1. Overview 220 8.2. Authentication Setup 221 8.2.1. Setup Summary 221 8.2.2. The Local Database 221 8.2.3. External Authentication Servers 221 8.2.4. Authentication Rules 222 8.2.5. Authentication Processing 223 8.2.6. HTTP Authentication 223 9. VPN ...229 9.1. Overview 229 9.1.1. The Need for VPNs 229 9.1.2. VPN Encryption 229 9.1.3. VPN Planning 229 9.1.4. Key Distribution 230 9.2. VPN Quickstart Guide 231 9.2.1. IPsec LAN to LAN with Pre-shared Keys 231 9.2.2. IPsec Roaming Clients with Pre-shared Keys 232 6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

6.2.8. H.323
......................................................................................
155
6.3. Web Content Filtering
...........................................................................
169
6.3.1. Overview
.................................................................................
169
6.3.2. Active Content Handling
.............................................................
169
6.3.3. Static Content Filtering
...............................................................
170
6.3.4. Dynamic Web Content Filtering
...................................................
172
6.4. Anti-Virus Scanning
.............................................................................
183
6.4.1. Overview
.................................................................................
183
6.4.2. Implementation
.........................................................................
183
6.4.3. Activating Anti-Virus Scanning
....................................................
184
6.4.4. The Signature Database
..............................................................
184
6.4.5. Subscribing to the D-Link Anti-Virus Service
.................................
184
6.4.6. Anti-Virus Options
.....................................................................
184
6.5. Intrusion Detection and Prevention
..........................................................
188
6.5.1. Overview
.................................................................................
188
6.5.2. IDP Availability in D-Link Models
...............................................
188
6.5.3. IDP Rules
.................................................................................
190
6.5.4. Insertion/Evasion Attack Prevention
..............................................
191
6.5.5. IDP Pattern Matching
.................................................................
192
6.5.6. IDP Signature Groups
.................................................................
192
6.5.7. IDP Actions
..............................................................................
194
6.5.8. SMTP Log Receiver for IDP Events
..............................................
194
6.6. Denial-Of-Service (DoS) Attacks
............................................................
198
6.6.1. Overview
.................................................................................
198
6.6.2. DoS Attack Mechanisms
.............................................................
198
6.6.3.
Ping of Death
and
Jolt
Attacks
.....................................................
198
6.6.4. Fragmentation overlap attacks:
Teardrop, Bonk, Boink and Nestea
......
199
6.6.5. The
Land
and
LaTierra
attacks
.....................................................
199
6.6.6. The
WinNuke
attack
...................................................................
199
6.6.7. Amplification attacks:
Smurf, Papasmurf, Fraggle
...........................
200
6.6.8. TCP SYN Flood Attacks
.............................................................
201
6.6.9. The
Jolt2
Attack
........................................................................
201
6.6.10. Distributed DoS Attacks
............................................................
201
6.7. Blacklisting Hosts and Networks
.............................................................
202
7. Address Translation
........................................................................................
204
7.1. Dynamic Network Address Translation
....................................................
204
7.2. NAT Pools
..........................................................................................
207
7.3. Static Address Translation
.....................................................................
210
7.3.1. Translation of a Single IP Address (1:1)
.........................................
210
7.3.2. Translation of Multiple IP Addresses (M:N)
....................................
213
7.3.3. All-to-One Mappings (N:1)
.........................................................
215
7.3.4. Port Translation
.........................................................................
216
7.3.5. Protocols handled by SAT
...........................................................
216
7.3.6. Multiple SAT rule matches
..........................................................
217
7.3.7. SAT and FwdFast Rules
..............................................................
217
8. User Authentication
........................................................................................
220
8.1. Overview
............................................................................................
220
8.2. Authentication Setup
.............................................................................
221
8.2.1. Setup Summary
.........................................................................
221
8.2.2. The Local Database
....................................................................
221
8.2.3. External Authentication Servers
....................................................
221
8.2.4. Authentication Rules
..................................................................
222
8.2.5. Authentication Processing
...........................................................
223
8.2.6. HTTP Authentication
.................................................................
223
9. VPN
.............................................................................................................
229
9.1. Overview
............................................................................................
229
9.1.1. The Need for VPNs
....................................................................
229
9.1.2. VPN Encryption
........................................................................
229
9.1.3. VPN Planning
...........................................................................
229
9.1.4. Key Distribution
........................................................................
230
9.2. VPN Quickstart Guide
..........................................................................
231
9.2.1. IPsec LAN to LAN with Pre-shared Keys
.......................................
231
9.2.2. IPsec Roaming Clients with Pre-shared Keys
..................................
232
User Manual
6