4.10. Add an OSPF Area .....................................................................................217
4.11. Add OSPF Interface Objects .........................................................................217
4.12. Import Routes from an OSPF AS into the Main Routing Table ............................ 218
4.13. Exporting the Default Route into an OSPF AS .................................................218
4.14. Forwarding of Multicast Traffic using the SAT Multiplex Rule ...........................222
4.15. Multicast Forwarding - Address Translation ....................................................224
4.16. IGMP - No Address Translation ....................................................................227
4.17. if1 Configuration ........................................................................................228
4.18. if2 Configuration - Group Translation .............................................................229
4.19. Setting up Transparent Mode for Scenario 1 ....................................................240
4.20. Setting up Transparent Mode for Scenario 2 ....................................................241
5.1. Setting up a DHCP server ..............................................................................251
5.2. Static DHCP Host Assignment ........................................................................254
5.3. Setting up a DHCP Relayer ............................................................................256
5.4. Creating an IP Pool .......................................................................................261
6.1. Setting up an Access Rule ..............................................................................265
6.2. Protecting an FTP Server with an ALG .............................................................274
6.3. Protecting FTP Clients ..................................................................................277
6.4. Protecting Phones Behind NetDefend Firewalls ..................................................305
6.5. H.323 with Private IPv4 Addresses ..................................................................306
6.6. Two Phones Behind Different NetDefend Firewalls ............................................307
6.7. Using Private IPv4 Addresses .........................................................................308
6.8. H.323 with Gatekeeper ..................................................................................309
6.9. H.323 with Gatekeeper and two NetDefend Firewalls .......................................... 311
6.10. Using the H.323 ALG in a Corporate Environment ...........................................312
6.11. Configuring remote offices for H.323 .............................................................315
6.12. Allowing the H.323 Gateway to register with the Gatekeeper .............................. 315
6.13. Stripping ActiveX and Java applets ................................................................320
6.14. Setting up a white and blacklist .....................................................................321
6.15. Enabling Dynamic Web Content Filtering .......................................................324
6.16. Enabling Audit Mode ..................................................................................326
6.17. Reclassifying a blocked site ..........................................................................327
6.18. Editing Content Filtering HTTP Banner Files ...................................................334
6.19. Activating Anti-Virus Scanning .....................................................................341
6.20. Configuring an SMTP Log Receiver ..............................................................351
6.21. Setting up IDP for a Mail Server ....................................................................352
6.22. Adding a Host to the Whitelist ......................................................................361
7.1. Specifying a NAT Rule ..................................................................................366
7.2. Using NAT Pools .........................................................................................370
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 373
7.4. Enabling Traffic to a Web Server on an Internal Network .................................... 375
7.5. Translating Traffic to Multiple Protected Web Servers ........................................377
7.6. Translating Traffic to a Single Protected Web Server (N:1) ..................................380
8.1. Creating an Authentication User Group ............................................................402
8.2. User Authentication Setup for Web Access .......................................................402
8.3. Configuring a RADIUS Server .......................................................................403
8.4. Editing Content Filtering HTTP Banner Files ....................................................405
9.1. Using an Algorithm Proposal List ....................................................................433
9.2. Using a Pre-Shared key .................................................................................434
9.3. Using an Identity List ....................................................................................436
9.4. Setting up a PSK based VPN tunnel for roaming clients .......................................441
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ...............441
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients .................443
9.7. Setting Up Config Mode ................................................................................445
9.8. Using Config Mode with IPsec Tunnels ............................................................445
9.9. Setting up an LDAP server .............................................................................446
9.10. Setting up a PPTP server ..............................................................................458
9.11. Setting up an L2TP server ............................................................................459
9.12. Setting up an L2TP Tunnel Over IPsec ...........................................................459
9.13. Setting Up an SSL VPN Interface ..................................................................472
10.1. Applying a Simple Bandwidth Limit ..............................................................488
10.2. Limiting Bandwidth in Both Directions ...........................................................490
User Manual
13