4.10. Add an OSPF Area ..................................................................................... 217
4.11. Add OSPF Interface Objects ......................................................................... 217
4.12. Import Routes from an OSPF AS into the Main Routing Table ............................218
4.13. Exporting the Default Route into an OSPF AS .................................................218
4.14. Forwarding of Multicast Traffic using the SAT Multiplex Rule ...........................222
4.15. Multicast Forwarding - Address Translation ....................................................224
4.16. IGMP - No Address Translation ....................................................................227
4.17. if1 Configuration ........................................................................................228
4.18. if2 Configuration - Group Translation .............................................................229
4.19. Setting up Transparent Mode for Scenario 1 ....................................................240
4.20. Setting up Transparent Mode for Scenario 2 ....................................................241
5.1. Setting up a DHCP server .............................................................................. 251
5.2. Static DHCP Host Assignment ........................................................................254
5.3. Setting up a DHCP Relayer ............................................................................256
5.4. Creating an IP Pool .......................................................................................261
6.1. Setting up an Access Rule .............................................................................. 265
6.2. Protecting an FTP Server with an ALG .............................................................274
6.3. Protecting FTP Clients ..................................................................................277
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 305
6.5. H.323 with Private IPv4 Addresses ..................................................................306
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 307
6.7. Using Private IPv4 Addresses .........................................................................308
6.8. H.323 with Gatekeeper .................................................................................. 309
6.9. H.323 with Gatekeeper and two NetDefend Firewalls ..........................................311
6.10. Using the H.323 ALG in a Corporate Environment ...........................................312
6.11. Configuring remote offices for H.323 .............................................................315
6.12. Allowing the H.323 Gateway to register with the Gatekeeper ..............................315
6.13. Stripping ActiveX and Java applets ................................................................ 320
6.14. Setting up a white and blacklist .....................................................................321
6.15. Enabling Dynamic Web Content Filtering ....................................................... 324
6.16. Enabling Audit Mode ..................................................................................326
6.17. Reclassifying a blocked site ..........................................................................327
6.18. Editing Content Filtering HTTP Banner Files ...................................................334
6.19. Activating Anti-Virus Scanning ..................................................................... 341
6.20. Configuring an SMTP Log Receiver ..............................................................351
6.21. Setting up IDP for a Mail Server ....................................................................352
6.22. Adding a Host to the Whitelist ......................................................................361
7.1. Specifying a NAT Rule ..................................................................................366
7.2. Using NAT Pools .........................................................................................370
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 373
7.4. Enabling Traffic to a Web Server on an Internal Network ....................................375
7.5. Translating Traffic to Multiple Protected Web Servers ........................................377
7.6. Translating Traffic to a Single Protected Web Server (N:1) ..................................380
8.1. Creating an Authentication User Group ............................................................402
8.2. User Authentication Setup for Web Access .......................................................402
8.3. Configuring a RADIUS Server ....................................................................... 403
8.4. Editing Content Filtering HTTP Banner Files ....................................................405
9.1. Using an Algorithm Proposal List ....................................................................433
9.2. Using a Pre-Shared key ................................................................................. 434
9.3. Using an Identity List ....................................................................................436
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 441
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ...............441
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients .................443
9.7. Setting Up Config Mode ................................................................................445
9.8. Using Config Mode with IPsec Tunnels ............................................................445
9.9. Setting up an LDAP server .............................................................................446
9.10. Setting up a PPTP server .............................................................................. 458
9.11. Setting up an L2TP server ............................................................................ 459
9.12. Setting up an L2TP Tunnel Over IPsec ...........................................................459
9.13. Setting Up an SSL VPN Interface .................................................................. 472
10.1. Applying a Simple Bandwidth Limit ..............................................................488
10.2. Limiting Bandwidth in Both Directions ........................................................... 490
User Manual
13