4.6.4. Advanced IGMP Settings ............................................................237
4.7. Transparent Mode ................................................................................240
4.7.1. Overview .................................................................................240
4.7.2. Enabling Internet Access .............................................................245
4.7.3. Transparent Mode Scenarios ........................................................246
4.7.4. Spanning Tree BPDU Support ......................................................250
4.7.5. Advanced Settings for Transparent Mode .......................................251
5. DHCP Services ..............................................................................................255
5.1. Overview ............................................................................................255
5.2. DHCP Servers .....................................................................................256
5.2.1. Static DHCP Hosts .....................................................................259
5.2.2. Custom Options .........................................................................261
5.3. DHCP Relaying ...................................................................................262
5.3.1. DHCP Relay Advanced Settings ...................................................263
5.4. IP Pools ..............................................................................................265
6. Security Mechanisms .......................................................................................269
6.1. Access Rules .......................................................................................269
6.1.1. Overview .................................................................................269
6.1.2. IP Spoofing ..............................................................................270
6.1.3. Access Rule Settings ..................................................................270
6.2. ALGs .................................................................................................272
6.2.1. Overview .................................................................................272
6.2.2. The HTTP ALG ........................................................................273
6.2.3. The FTP ALG ...........................................................................276
6.2.4. The TFTP ALG .........................................................................285
6.2.5. The SMTP ALG ........................................................................286
6.2.6. The POP3 ALG .........................................................................295
6.2.7. The PPTP ALG .........................................................................296
6.2.8. The SIP ALG ............................................................................297
6.2.9. The H.323 ALG ........................................................................308
6.2.10. The TLS ALG .........................................................................322
6.3. Web Content Filtering ...........................................................................325
6.3.1. Overview .................................................................................325
6.3.2. Active Content Handling .............................................................325
6.3.3. Static Content Filtering ...............................................................326
6.3.4. Dynamic Web Content Filtering ...................................................328
6.4. Anti-Virus Scanning .............................................................................343
6.4.1. Overview .................................................................................343
6.4.2. Implementation .........................................................................343
6.4.3. Activating Anti-Virus Scanning ....................................................344
6.4.4. The Signature Database ..............................................................344
6.4.5. Subscribing to the D-Link Anti-Virus Service .................................345
6.4.6. Anti-Virus Options .....................................................................345
6.5. Intrusion Detection and Prevention ..........................................................349
6.5.1. Overview .................................................................................349
6.5.2. IDP Availability for D-Link Models ..............................................349
6.5.3. IDP Rules .................................................................................351
6.5.4. Insertion/Evasion Attack Prevention ..............................................353
6.5.5. IDP Pattern Matching .................................................................354
6.5.6. IDP Signature Groups .................................................................355
6.5.7. IDP Actions ..............................................................................356
6.5.8. SMTP Log Receiver for IDP Events ..............................................357
6.6. Denial-of-Service Attack Prevention ........................................................361
6.6.1. Overview .................................................................................361
6.6.2. DoS Attack Mechanisms .............................................................361
6.6.3. Ping of Death and Jolt Attacks .....................................................361
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ......362
6.6.5. The Land and LaTierra attacks .....................................................362
6.6.6. The WinNuke attack ...................................................................362
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ...........................363
6.6.8. TCP SYN Flood Attacks .............................................................364
6.6.9. The Jolt2 Attack ........................................................................364
User Manual
6