5.2. DHCP Servers .....................................................................................190
5.3. Static DHCP Assignment ....................................................................... 193
5.3.1. DHCP Advanced Settings ............................................................ 193
5.4. DHCP Relaying ................................................................................... 195
5.4.1. DHCP Relay Advanced Settings ...................................................196
5.5. IP Pools .............................................................................................. 198
6. Security Mechanisms .......................................................................................201
6.1. Access Rules .......................................................................................201
6.1.1. Introduction ..............................................................................201
6.1.2. IP Spoofing ..............................................................................201
6.1.3. Access Rule Settings .................................................................. 202
6.2. ALGs .................................................................................................204
6.2.1. Overview ................................................................................. 204
6.2.2. The HTTP ALG ........................................................................ 205
6.2.3. The FTP ALG ........................................................................... 208
6.2.4. The TFTP ALG .........................................................................214
6.2.5. The SMTP ALG ........................................................................ 215
6.2.6. The POP3 ALG .........................................................................224
6.2.7. The SIP ALG ............................................................................ 224
6.2.8. The H.323 ALG ........................................................................234
6.2.9. The TLS ALG ...........................................................................248
6.3. Web Content Filtering ...........................................................................251
6.3.1. Overview ................................................................................. 251
6.3.2. Active Content Handling .............................................................251
6.3.3. Static Content Filtering ............................................................... 252
6.3.4. Dynamic Web Content Filtering ...................................................254
6.4. Anti-Virus Scanning .............................................................................268
6.4.1. Overview ................................................................................. 268
6.4.2. Implementation ......................................................................... 268
6.4.3. Activating Anti-Virus Scanning ....................................................269
6.4.4. The Signature Database ..............................................................270
6.4.5. Subscribing to the D-Link Anti-Virus Service .................................270
6.4.6. Anti-Virus Options .....................................................................270
6.5. Intrusion Detection and Prevention ..........................................................274
6.5.1. Overview ................................................................................. 274
6.5.2. IDP Availability for D-Link Models ..............................................274
6.5.3. IDP Rules ................................................................................. 276
6.5.4. Insertion/Evasion Attack Prevention ..............................................277
6.5.5. IDP Pattern Matching .................................................................278
6.5.6. IDP Signature Groups .................................................................279
6.5.7. IDP Actions ..............................................................................281
6.5.8. SMTP Log Receiver for IDP Events .............................................. 281
6.6. Denial-of-Service Attack Prevention ........................................................285
6.6.1. Overview ................................................................................. 285
6.6.2. DoS Attack Mechanisms .............................................................285
6.6.3. Ping of Death and Jolt Attacks .....................................................285
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ......286
6.6.5. The Land and LaTierra attacks .....................................................286
6.6.6. The WinNuke attack ...................................................................286
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ...........................287
6.6.8. TCP SYN Flood Attacks .............................................................288
6.6.9. The Jolt2 Attack ........................................................................ 288
6.6.10. Distributed DoS Attacks ............................................................ 288
6.7. Blacklisting Hosts and Networks .............................................................289
7. Address Translation ........................................................................................ 292
7.1. NAT ..................................................................................................292
7.2. NAT Pools ..........................................................................................297
7.3. SAT ...................................................................................................300
7.3.1. Translation of a Single IP Address (1:1) .........................................300
7.3.2. Translation of Multiple IP Addresses (M:N) ....................................304
7.3.3. All-to-One Mappings (N:1) .........................................................306
7.3.4. Port Translation ......................................................................... 306
7.3.5. Protocols Handled by SAT ..........................................................307
User Manual
6