List of Figures
1.1. Packet Flow Schematic Part I
...........................................................................
23
1.2. Packet Flow Schematic Part II
..........................................................................
24
1.3. Packet Flow Schematic Part III
.........................................................................
25
1.4. Expanded
Apply Rules
Logic
............................................................................
26
3.1. VLAN Connections
......................................................................................
103
3.2. An ARP Publish Ethernet Frame
.....................................................................
116
3.3. Simplified NetDefendOS Traffic Flow
.............................................................
123
4.1. A Typical Routing Scenario
...........................................................................
149
4.2. Using
Local IP Address
with an Unbound Network
............................................
151
4.3. A Route Failover Scenario for ISP Access
.........................................................
157
4.4. A Proxy ARP Example
..................................................................................
163
4.5. The RLB Round Robin Algorithm
...................................................................
171
4.6. The RLB Spillover Algorithm
.........................................................................
172
4.7. A Route Load Balancing Scenario
...................................................................
174
4.8. A Simple OSPF Scenario
...............................................................................
177
4.9. OSPF Providing Route Redundancy
.................................................................
178
4.10. Virtual Links Connecting Areas
....................................................................
182
4.11. Virtual Links with Partitioned Backbone
.........................................................
183
4.12. NetDefendOS OSPF Objects
........................................................................
184
4.13. Dynamic Routing Rule Objects
.....................................................................
191
4.14. Multicast Forwarding - No Address Translation
................................................
201
4.15. Multicast Forwarding - Address Translation
....................................................
203
4.16. Multicast Snoop Mode
.................................................................................
205
4.17. Multicast Proxy Mode
.................................................................................
205
4.18. Non-transparent Mode Internet Access
...........................................................
217
4.19. Transparent Mode Internet Access
.................................................................
217
4.20. Transparent Mode Scenario 1
........................................................................
219
4.21. Transparent Mode Scenario 2
........................................................................
220
4.22. An Example BPDU Relaying Scenario
...........................................................
223
5.1. DHCP Server Objects
...................................................................................
232
6.1. Deploying an ALG
.......................................................................................
245
6.2. HTTP ALG Processing Order
.........................................................................
248
6.3. FTP ALG Hybrid Mode
.................................................................................
250
6.4. SMTP ALG Processing Order
.........................................................................
261
6.5. Anti-Spam Filtering
......................................................................................
263
6.6. PPTP ALG Usage
........................................................................................
269
6.7. TLS Termination
..........................................................................................
295
6.8. Dynamic Content Filtering Flow
.....................................................................
301
6.9. IDP Database Updating
.................................................................................
321
6.10. IDP Signature Selection
...............................................................................
323
7.1. NAT IP Address Translation
..........................................................................
341
7.2. A NAT Example
..........................................................................................
343
7.3. Anonymizing with NAT
................................................................................
345
7.4. The Role of the DMZ
....................................................................................
350
8.1. Normal LDAP Authentication
........................................................................
371
8.2. LDAP for PPP with CHAP, MS-CHAPv1 or MS-CHAPv2
..................................
372
9.1. The AH protocol
..........................................................................................
405
9.2. The ESP protocol
.........................................................................................
405
9.3. PPTP Client Usage
.......................................................................................
439
9.4. Certificate Validation Components
..................................................................
441
10.1. Pipe Rules Determine Pipe Usage
..................................................................
453
10.2.
FwdFast
Rules Bypass Traffic Shaping
...........................................................
454
10.3. Differentiated Limits Using Chains
................................................................
457
10.4. The Eight Pipe Precedences
..........................................................................
458
10.5. Minimum and Maximum Pipe Precedence
.......................................................
460
10.6. Traffic Grouped By IP Address
.....................................................................
464
10.7. A Basic Traffic Shaping Scenario
..................................................................
467
10.8. IDP Traffic Shaping P2P Scenario
.................................................................
474
10