NetDefendOS State Engine Packet Flow The diagrams in this section provide a summary of the flow of packets through the NetDefendOS state-engine. The next section provides a set of diagrams illustrating the flow of packets through NetDefendOS.ġ.3. Processing such as encryption or encapsulation might occur. Point in time in reference to a predefined schedule If a match cannot be found, the packet is dropped.IP protocol (for example TCP, UDP, ICMP).The most fundamental set of rules are the IP Rules, which are used to define the layer 3 IP filtering policy as well as carrying out address translation and server load balancing. NetDefendOS Rule Sets Finally, rules which are defined by the administrator in the various rule sets are used for actually implementing NetDefendOS security policies. Traditional IP routers or switches commonly inspect all packets and then perform forwarding decisions based on information found in the packet headers. State-based Architecture The NetDefendOS architecture is centered around the concept of state-based connections. These features are discussed in detail in Chapter 10, Traffic Management. NetDefendOS supports IPsec, L2TP and PPTP based VPNs concurrently, can act as either server or client for all of the VPN types, and can provide individual security policies for each VPN tunnel.Įnables a device running NetDefendOS to distribute network load to multiple hosts. VPN NetDefendOS supports a range of Virtual Private Network (VPN) solutions.
Features D-Link NetDefendOS is the base software engine that drives and controls the range of NetDefend Firewall hardware products.
User Manual DFL-210/260/800/860/1600/1660/2500/2560/2560G NetDefendOS Version 2.27.01 Published Copyright © 2010 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. 289, Sinhu 3rd Rd, Neihu District, Taipei City 114, Taiwan R.