Solwise SAR715PV ADSL Ethernet Router User’s Guide
Chapter
5
. The Configuration Screens in More Detail
71
to
Allow
if you want this to work.
h.
Binary Address Replacement
; select
Allow
or
Block
depending
on whether you want to use binary address replacement on
an existing trigger.
i.
Address Translation Type; specify what type of address
replacement is set on a trigger. You must set
Binary Address
Replacement
to
Allow
if you want this to work.
3.
Once you have configured the trigger, click on
Apply
. The
Firewall
Trigger Configuration
page is displayed, containing details of the
trigger that you have just configured.
4.
Each trigger displayed in the
Firewall Trigger Configuration
page
has a
Delete
hyperlink assigned to it. To delete a trigger, click on this
link, then at the confirmation page, click on the
Delete
button. The
Firewall Trigger Configuration
page is displayed and details of
the deleted trigger have been removed. There are two hyperlinks on
the page:
a.
To add a new trigger, click on
New Trigger
.
b.
To display the
Security Interface Configuration
page, click on
Return to Interface List
.
Configuring Intrusion Detection Settings
Intrusion Detection settings allow you to protect your network from
intrusions such as denial of service (DOS) attacks, port scanning
and web spoofing.
To configure Intrusion Detection settings:
1.
Go to the
Policies, Triggers and Intrusion Detection
section of the
Security Interface Configuration
page. Click on
Configure Intrusion
Detection
The
Firewall Configure Intrusion Detection
page is displayed:
2.
Configure Intrusion Detection as follows: