4.6.4. Advanced IGMP Settings ............................................................ 237
4.7. Transparent Mode ................................................................................ 240
4.7.1. Overview ................................................................................. 240
4.7.2. Enabling Internet Access ............................................................. 245
4.7.3. Transparent Mode Scenarios ........................................................ 246
4.7.4. Spanning Tree BPDU Support ...................................................... 250
4.7.5. Advanced Settings for Transparent Mode ....................................... 251
5. DHCP Services .............................................................................................. 255
5.1. Overview ............................................................................................ 255
5.2. DHCP Servers ..................................................................................... 256
5.2.1. Static DHCP Hosts ..................................................................... 259
5.2.2. Custom Options ......................................................................... 261
5.3. DHCP Relaying ................................................................................... 262
5.3.1. DHCP Relay Advanced Settings ................................................... 263
5.4. IP Pools ..............................................................................................265
6. Security Mechanisms ....................................................................................... 269
6.1. Access Rules ....................................................................................... 269
6.1.1. Overview ................................................................................. 269
6.1.2. IP Spoofing .............................................................................. 270
6.1.3. Access Rule Settings .................................................................. 270
6.2. ALGs ................................................................................................. 272
6.2.1. Overview ................................................................................. 272
6.2.2. The HTTP ALG ........................................................................ 273
6.2.3. The FTP ALG ........................................................................... 276
6.2.4. The TFTP ALG ......................................................................... 285
6.2.5. The SMTP ALG ........................................................................ 286
6.2.6. The POP3 ALG ......................................................................... 295
6.2.7. The PPTP ALG .........................................................................296
6.2.8. The SIP ALG ............................................................................ 297
6.2.9. The H.323 ALG ........................................................................ 308
6.2.10. The TLS ALG .........................................................................322
6.3. Web Content Filtering ........................................................................... 325
6.3.1. Overview ................................................................................. 325
6.3.2. Active Content Handling .............................................................325
6.3.3. Static Content Filtering ...............................................................326
6.3.4. Dynamic Web Content Filtering ................................................... 328
6.4. Anti-Virus Scanning ............................................................................. 343
6.4.1. Overview ................................................................................. 343
6.4.2. Implementation ......................................................................... 343
6.4.3. Activating Anti-Virus Scanning ....................................................344
6.4.4. The Signature Database .............................................................. 344
6.4.5. Subscribing to the D-Link Anti-Virus Service ................................. 345
6.4.6. Anti-Virus Options ..................................................................... 345
6.5. Intrusion Detection and Prevention .......................................................... 349
6.5.1. Overview ................................................................................. 349
6.5.2. IDP Availability for D-Link Models .............................................. 349
6.5.3. IDP Rules ................................................................................. 351
6.5.4. Insertion/Evasion Attack Prevention .............................................. 353
6.5.5. IDP Pattern Matching ................................................................. 354
6.5.6. IDP Signature Groups ................................................................. 355
6.5.7. IDP Actions ..............................................................................356
6.5.8. SMTP Log Receiver for IDP Events .............................................. 357
6.6. Denial-of-Service Attack Prevention ........................................................361
6.6.1. Overview ................................................................................. 361
6.6.2. DoS Attack Mechanisms ............................................................. 361
6.6.3. Ping of Death and Jolt Attacks ..................................................... 361
6.6.4. Fragmentation overlap attacks: Teardrop, Bonk, Boink and Nestea ...... 362
6.6.5. The Land and LaTierra attacks ..................................................... 362
6.6.6. The WinNuke attack ................................................................... 362
6.6.7. Amplification attacks: Smurf, Papasmurf, Fraggle ........................... 363
6.6.8. TCP SYN Flood Attacks ............................................................. 364
6.6.9. The Jolt2 Attack ........................................................................ 364
User Manual
6