5.2. DHCP Servers .....................................................................................193
5.3. Static DHCP Assignment .......................................................................196
5.3.1. DHCP Advanced Settings ............................................................196
5.4. DHCP Relaying ...................................................................................198
5.4.1. DHCP Relay Advanced Settings ...................................................199
5.5. IP Pools ..............................................................................................201
6. Security Mechanisms .......................................................................................204
6.1. Access Rules .......................................................................................204
6.1.1. Overview .................................................................................204
6.1.2. IP Spoofing ..............................................................................204
6.1.3. Access Rule Settings ..................................................................205
6.2. ALGs .................................................................................................207
6.2.1. Overview .................................................................................207
6.2.2. The HTTP ALG ........................................................................208
6.2.3. The FTP ALG ...........................................................................211
6.2.4. The TFTP ALG .........................................................................217
6.2.5. The SMTP ALG ........................................................................218
6.2.6. The POP3 ALG .........................................................................227
6.2.7. The PPTP ALG .........................................................................227
6.2.8. The SIP ALG ............................................................................229
6.2.9. The H.323 ALG ........................................................................239
6.2.10. The TLS ALG .........................................................................252
6.3. Web Content Filtering ...........................................................................255
6.3.1. Overview .................................................................................255
6.3.2. Active Content Handling .............................................................255
6.3.3. Static Content Filtering ...............................................................256
6.3.4. Dynamic Web Content Filtering ...................................................258
6.4. Anti-Virus Scanning .............................................................................272
6.4.1. Overview .................................................................................272
6.4.2. Implementation .........................................................................272
6.4.3. Activating Anti-Virus Scanning ....................................................273
6.4.4. The Signature Database ..............................................................274
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 274
6.4.6. Anti-Virus Options .....................................................................274
6.5. Intrusion Detection and Prevention ..........................................................278
6.5.1. Overview .................................................................................278
6.5.2. IDP Availability for D-Link Models ..............................................278
6.5.3. IDP Rules .................................................................................280
6.5.4. Insertion/Evasion Attack Prevention ..............................................281
6.5.5. IDP Pattern Matching .................................................................282
6.5.6. IDP Signature Groups .................................................................283
6.5.7. IDP Actions ..............................................................................285
6.5.8. SMTP Log Receiver for IDP Events ..............................................285
6.6. Denial-of-Service Attack Prevention ........................................................289
6.6.1. Overview .................................................................................289
6.6.2. DoS Attack Mechanisms .............................................................289
6.6.3. Ping of Death and Jolt Attacks .....................................................289
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ......290
6.6.5. The Land and LaTierra attacks .....................................................290
6.6.6. The WinNuke attack ...................................................................290
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ...........................291
6.6.8. TCP SYN Flood Attacks .............................................................292
6.6.9. The Jolt2 Attack ........................................................................292
6.6.10. Distributed DoS Attacks ............................................................292
6.7. Blacklisting Hosts and Networks .............................................................294
7. Address Translation ........................................................................................297
7.1. Overview ............................................................................................297
7.2. NAT ..................................................................................................298
7.3. NAT Pools ..........................................................................................303
7.4. SAT ...................................................................................................306
7.4.1. Translation of a Single IP Address (1:1) .........................................306
7.4.2. Translation of Multiple IP Addresses (M:N) ....................................310
7.4.3. All-to-One Mappings (N:1) .........................................................312
User Manual
6