6.1. Setting up an Access Rule .............................................................................. 423
6.2. Using the Light Weight HTTP ALG ................................................................... 433
6.3. Protecting an FTP Server with an ALG .............................................................. 440
6.4. Protecting FTP Clients ................................................................................... 444
6.5. SMTP ALG Setup .......................................................................................... 453
6.6. POP3 ALG Setup .......................................................................................... 459
6.7. SIP with Local Clients/Internet Proxy Using IP Rules ........................................... 470
6.8. SIP with Local Clients/Internet Proxy Using IP Policies ........................................ 471
6.9. Protecting Internal H.323 Phones Using IP Rules ................................................ 482
6.10. Protecting Internal H.323 Phones Using IP Policy Objects .................................. 483
6.11. H.323 with a Private Address Using IP Rules .................................................... 485
6.12. 2 Phones Behind Different NetDefend Firewalls Using IP Rules .......................... 487
6.13. Using Private IPv4 Addresses ........................................................................ 489
6.14. H.323 with Gatekeeper ................................................................................ 491
6.15. H.323 with Gatekeeper and two NetDefend Firewalls ....................................... 493
6.16. Using H.323 in an Enterprise Environment ...................................................... 495
6.17. Configuring remote offices for H.323 ............................................................. 498
6.18. Allowing the H.323 Gateway to register with the Gatekeeper ............................ 499
6.19. Stripping ActiveX and Java applets ................................................................ 504
6.20. URL Filtering Using IP Rules .......................................................................... 506
6.21. Enabling Web Content Filtering Using IP Rules ................................................ 511
6.22. Enabling Audit Mode .................................................................................. 513
6.23. Reclassifying a blocked site .......................................................................... 514
6.24. Enabling WCF with IP Policies ....................................................................... 516
6.25. Editing Content Filtering HTTP Banner Files .................................................... 522
6.26. Enabling the WCF Performance Log .............................................................. 525
6.27. Email filtering of IMAP Traffic ........................................................................ 531
6.28. Activating Anti-Virus with an IP Rule .............................................................. 547
6.29. Activating Anti-Virus with an IP Policy ............................................................ 548
6.30. Changing the Anti-Virus Cache Lifetime ......................................................... 550
6.31. Setting up IDP for a Mail Server ..................................................................... 560
6.32. Configuring an SMTP Log Receiver ................................................................ 563
6.33. Adding a Host to the Whitelist ...................................................................... 572
7.1. Specifying a NAT IP Rule ................................................................................ 578
7.2. Specifying a NAT IP Policy .............................................................................. 579
7.3. Using NAT Pools .......................................................................................... 586
7.4. One-to-One IP Translation ............................................................................. 591
7.5. Many-to-Many IP Translation ......................................................................... 594
7.6. All-to-One IP Translation ............................................................................... 597
7.7. Setting up a SAT IP Policy .............................................................................. 602
8.1. Creating a Local User Database ...................................................................... 610
8.2. Adding a User with Group Membership ........................................................... 611
8.3. Configuring a RADIUS Server ......................................................................... 615
8.4. User Authentication Setup for Web Access ....................................................... 629
8.5. Editing Content Filtering HTTP Banner Files ...................................................... 636
8.6. Policies Requiring Authentication ................................................................... 639
8.7. Enabling User Identity Awareness ................................................................... 642
8.8. Radius Relay ................................................................................................ 655
8.9. RADIUS Accounting Server Setup ................................................................... 662
9.1. Using an Algorithm Proposal List .................................................................... 695
9.2. Using a Pre-Shared key ................................................................................. 696
9.3. Using an ID List ............................................................................................ 698
9.4. PSK Based LAN-to-LAN IPsec Tunnel Setup ....................................................... 705
9.5. PSK Based IPsec Tunnel for Roaming Clients Setup ............................................ 708
9.6. Certificate Based IPsec Tunnels for Roaming Clients ........................................... 710
9.7. Setting Up Config Mode Using a Predefined IP Pool ........................................... 712
9.8. Using Config Mode with IPsec Tunnels ............................................................ 713
9.9. IKEv2 EAP Client Setup .................................................................................. 716
9.10. Setting up an LDAP server ........................................................................... 719
9.11. Enabling IPsec Tunnel Monitoring ................................................................. 722
9.12. Setting up a PPTP server .............................................................................. 730
User Manual
15