4.7. Transparent Mode
................................................................................
207
4.7.1. Overview
.................................................................................
207
4.7.2. Enabling Internet Access
.............................................................
211
4.7.3. Transparent Mode Scenarios
........................................................
213
4.7.4. Spanning Tree BPDU Support
......................................................
217
4.7.5. Advanced Settings for Transparent Mode
.......................................
218
5. DHCP Services
..............................................................................................
223
5.1. Overview
............................................................................................
223
5.2. DHCP Servers
.....................................................................................
224
5.2.1. Static DHCP Hosts
.....................................................................
227
5.2.2. Custom Options
.........................................................................
228
5.3. DHCP Relaying
...................................................................................
230
5.3.1. DHCP Relay Advanced Settings
...................................................
231
5.4. IP Pools
..............................................................................................
233
6. Security Mechanisms
.......................................................................................
237
6.1. Access Rules
.......................................................................................
237
6.1.1. Overview
.................................................................................
237
6.1.2. IP Spoofing
..............................................................................
238
6.1.3. Access Rule Settings
..................................................................
238
6.2. ALGs
.................................................................................................
240
6.2.1. Overview
.................................................................................
240
6.2.2. The HTTP ALG
........................................................................
241
6.2.3. The FTP ALG
...........................................................................
244
6.2.4. The TFTP ALG
.........................................................................
253
6.2.5. The SMTP ALG
........................................................................
254
6.2.6. The POP3 ALG
.........................................................................
263
6.2.7. The PPTP ALG
.........................................................................
264
6.2.8. The SIP ALG
............................................................................
265
6.2.9. The H.323 ALG
........................................................................
275
6.2.10. The TLS ALG
.........................................................................
289
6.3. Web Content Filtering
...........................................................................
292
6.3.1. Overview
.................................................................................
292
6.3.2. Active Content Handling
.............................................................
292
6.3.3. Static Content Filtering
...............................................................
293
6.3.4. Dynamic Web Content Filtering
...................................................
295
6.4. Anti-Virus Scanning
.............................................................................
309
6.4.1. Overview
.................................................................................
309
6.4.2. Implementation
.........................................................................
309
6.4.3. Activating Anti-Virus Scanning
....................................................
310
6.4.4. The Signature Database
..............................................................
311
6.4.5. Subscribing to the D-Link Anti-Virus Service
.................................
311
6.4.6. Anti-Virus Options
.....................................................................
311
6.5. Intrusion Detection and Prevention
..........................................................
315
6.5.1. Overview
.................................................................................
315
6.5.2. IDP Availability for D-Link Models
..............................................
315
6.5.3. IDP Rules
.................................................................................
317
6.5.4. Insertion/Evasion Attack Prevention
..............................................
318
6.5.5. IDP Pattern Matching
.................................................................
319
6.5.6. IDP Signature Groups
.................................................................
320
6.5.7. IDP Actions
..............................................................................
322
6.5.8. SMTP Log Receiver for IDP Events
..............................................
322
6.6. Denial-of-Service Attack Prevention
........................................................
326
6.6.1. Overview
.................................................................................
326
6.6.2. DoS Attack Mechanisms
.............................................................
326
6.6.3.
Ping of Death
and
Jolt
Attacks
.....................................................
326
6.6.4. Fragmentation overlap attacks:
Teardrop, Bonk, Boink and Nestea
......
327
6.6.5. The
Land
and
LaTierra
attacks
.....................................................
327
6.6.6. The
WinNuke
attack
...................................................................
327
6.6.7. Amplification attacks:
Smurf, Papasmurf, Fraggle
...........................
328
6.6.8. TCP SYN Flood Attacks
.............................................................
329
6.6.9. The
Jolt2
Attack
........................................................................
329
6.6.10. Distributed DoS Attacks
............................................................
329
6.7. Blacklisting Hosts and Networks
.............................................................
331
User Manual
6