6.3.7. IDP Actions ..............................................................................131
6.3.8. SMTP Log Receiver for IDP Events ..............................................131
6.4. Anti-Virus ..........................................................................................135
6.4.1. Overview .................................................................................135
6.4.2. Implementation .........................................................................135
6.4.3. Activation ................................................................................136
6.4.4. The Signature Database ..............................................................136
6.4.5. Subscribing to the D-Link Anti-Virus Service .................................136
6.4.6. Anti-Virus Options .....................................................................137
6.5. Web Content Filtering ...........................................................................140
6.5.1. Overview .................................................................................140
6.5.2. Active Content Handling .............................................................140
6.5.3. Static Content Filtering ...............................................................141
6.5.4. Dynamic Content Filtering ..........................................................143
6.6. Denial-Of-Service (DoS) Attacks ............................................................155
6.6.1. Overview .................................................................................155
6.6.2. DoS Attack Mechanisms .............................................................155
6.6.3. Ping of Death and Jolt Attacks .....................................................155
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ......156
6.6.5. The Land and LaTierra attacks .....................................................156
6.6.6. The WinNuke attack ...................................................................156
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ...........................157
6.6.8. TCP SYN Flood Attacks .............................................................158
6.6.9. The Jolt2 Attack ........................................................................158
6.6.10. Distributed DoS Attacks ............................................................158
6.7. Blacklisting Hosts and Networks .............................................................159
7. Address Translation ........................................................................................161
7.1. Dynamic Address Translation (NAT) .......................................................161
7.1.1. Which Protocols can NAT handle? ................................................162
7.2. Static Address Translation (SAT) ............................................................164
7.2.1. Translation of a Single IP Address (1:1) .........................................164
7.2.2. Translation of Multiple IP Addresses (M:N) ....................................167
7.2.3. All-to-One Mappings (N:1) .........................................................169
7.2.4. Port Translation .........................................................................170
7.2.5. Which Protocols can SAT handle? ................................................170
7.2.6. Which SAT Rule is executed if several are matching? ....................... 171
7.2.7. SAT and FwdFast Rules ..............................................................171
8. User Authentication ........................................................................................174
8.1. Overview ............................................................................................174
8.1.1. Authentication Methods ..............................................................174
8.1.2. Choosing Passwords ...................................................................174
8.1.3. User Types ...............................................................................175
8.2. Authentication Components ...................................................................176
8.2.1. The Local User Database (UserDB) ...............................................176
8.2.2. External Authentication Servers ....................................................176
8.2.3. Authentication Agents ................................................................176
8.2.4. Authentication Rules ..................................................................177
8.3. Authentication Process ..........................................................................178
9. Virtual Private Networks ..................................................................................181
9.1. VPN overview .....................................................................................181
9.1.1. The need for VPNs .....................................................................181
9.1.2. The basics of VPN Encryption .....................................................181
9.1.3. Planning a VPN .........................................................................181
9.2. IPsec ..................................................................................................183
9.2.1. IPsec Basics ..............................................................................183
9.2.2. Proposal Lists ...........................................................................192
9.2.3. Pre-shared Keys ........................................................................193
9.2.4. Identification Lists .....................................................................193
9.3. IPsec Tunnels ......................................................................................196
9.3.1. Overview of IPsec tunnels ...........................................................196
9.3.2. LAN to LAN tunnels with a Pre-shared Key ................................... 196
9.3.3. Roaming Clients ........................................................................196
9.3.4. Fetching CRLs from an alternate LDAP server ................................ 200
User Manual
vi