4.13. if2 Configuration - Group Translation ............................................................. 173
4.14. Setting up Transparent Mode for Scenario 1 .................................................... 184
4.15. Setting up Transparent Mode for Scenario 2 .................................................... 185
5.1. Setting up a DHCP server .............................................................................. 194
5.2. Checking DHCP Server Status ........................................................................ 194
5.3. Setting up Static DHCP ................................................................................. 196
5.4. Setting up a DHCP Relayer ............................................................................198
5.5. Creating an IP Pool ....................................................................................... 202
6.1. Setting up an Access Rule .............................................................................. 206
6.2. Protecting an FTP Server with an ALG ............................................................. 213
6.3. Protecting FTP Clients .................................................................................. 216
6.4. Protecting Phones Behind NetDefend Firewalls .................................................. 241
6.5. H.323 with private IP addresses ......................................................................242
6.6. Two Phones Behind Different NetDefend Firewalls ............................................ 243
6.7. Using Private IP Addresses ............................................................................ 244
6.8. H.323 with Gatekeeper .................................................................................. 245
6.9. H.323 with Gatekeeper and two NetDefend Firewalls ..........................................247
6.10. Using the H.323 ALG in a Corporate Environment ........................................... 248
6.11. Configuring remote offices for H.323 ............................................................. 251
6.12. Allowing the H.323 Gateway to register with the Gatekeeper ..............................251
6.13. Stripping ActiveX and Java applets ................................................................ 256
6.14. Setting up a white and blacklist ..................................................................... 257
6.15. Enabling Dynamic Web Content Filtering ....................................................... 260
6.16. Enabling Audit Mode ..................................................................................262
6.17. Reclassifying a blocked site ..........................................................................263
6.18. Editing Content Filtering HTTP Banner Files ...................................................270
6.19. Activating Anti-Virus Scanning ..................................................................... 276
6.20. Configuring an SMTP Log Receiver ..............................................................286
6.21. Setting up IDP for a Mail Server ....................................................................286
6.22. Adding a Host to the Whitelist ......................................................................295
7.1. Adding a NAT Rule ......................................................................................300
7.2. Using NAT Pools ......................................................................................... 304
7.3. Enabling Traffic to a Protected Web Server in a DMZ ......................................... 306
7.4. Enabling Traffic to a Web Server on an Internal Network ....................................308
7.5. Translating Traffic to Multiple Protected Web Servers ........................................310
8.1. Creating an Authentication User Group ............................................................331
8.2. User Authentication Setup for Web Access ....................................................... 331
8.3. Configuring a RADIUS Server ....................................................................... 332
8.4. Editing Content Filtering HTTP Banner Files ....................................................334
9.1. Using an Algorithm Proposal List ....................................................................361
9.2. Using a Pre-Shared key ................................................................................. 362
9.3. Using an Identity List .................................................................................... 363
9.4. Setting up a PSK based VPN tunnel for roaming clients ....................................... 367
9.5. Setting up a Self-signed Certificate based VPN tunnel for roaming clients ...............368
9.6. Setting up CA Server Certificate based VPN tunnels for roaming clients ................. 369
9.7. Setting Up Config Mode ................................................................................ 371
9.8. Using Config Mode with IPsec Tunnels ............................................................ 371
9.9. Setting up an LDAP server ............................................................................. 371
9.10. Setting up a PPTP server .............................................................................. 384
9.11. Setting up an L2TP server ............................................................................ 385
9.12. Setting up an L2TP Tunnel Over IPsec ........................................................... 385
10.1. Applying a Simple Bandwidth Limit .............................................................. 405
10.2. Limiting Bandwidth in Both Directions ........................................................... 407
10.3. Setting up SLB ........................................................................................... 431
12.1. A simple ZoneDefense scenario .................................................................... 449
User Manual
12