![D-Link DFL-1000 Скачать руководство пользователя страница 114](http://html.mh-extra.com/html/d-link/dfl-1000/dfl-1000_user-manual_75072114.webp)
Virus protection
Q: I am worried about viruses so I set the Anti-Virus options to the highest level. Now people are
complaining that some files that they need are blocked.
When Anti-Virus protection for HTTP or any of the email protocols is set to high, all files of potentially
dangerous types are blocked. The simple cure for this problem is to set a lower Security Protection Level.
Under normal conditions, all of the Anti-Virus Security Protection Levels can safely be set to Medium.
High security should only be used in extreme circumstances when a new virus has been found.
Q: A new virus is spreading through the Internet. What should I do?
Set virus protection to high. See
Configuring high level virus protection for your internal network
contact D-Link and obtain an AntiVirus database update which includes the new virus. To install the new
database, see
Updating your antivirus database
Web content filtering
Q: My employees are job hunting on the Internet when they should be working. Is it possible to
block the career sites.
See
Block access to Internet sites
and enter the names of the offending sites into the URL block list.
Q: I am worried about dangerous web content so I set the Script Filter options to block all scripts,
Java Applets, ActiveX, and cookies. Now people are complaining that some web sites are
inaccessible or don't work properly.
Some of the content types that can be blocked on the
Web Filter > Script Filter
page may be required
for a few Internet sites to work properly.
Logging
Q: I want to keep track of any attempts by intruders to go through the firewall to our network or to
get control of the firewall.
Go to
Log & Report > Log Setting
and turn on Log All External Traffic To Firewall. All attempts to
access the firewall are recorded. You can also get email alert messages by going to
System > Config >
Alert Mail
and entering the necessary information.
Q: Can I identify the attackers from the log?
The log does contain the IP address that the violating packets originated from, but since most Internet
users do not have static IP addresses these may not provide all of the information that you need.
Q: Our web site is on a computer on the internal network. How can I tell how many people look at
it?
Go to
Log & Report > Log Setting
and turn on Log All Incoming Policy Traffic. All traffic from the Internet
to the local network are recorded.
Q: How can I find out which company employees are spending time on the Internet?
Go to
Log & Report > Log Setting
and turn on Log All Outgoing Policy Traffic. All connections to Internet
sites are logged.
Q: I would like to use remote logging to my administration computer. How do I set up a syslog
server?
Several freeware syslog servers for Microsoft Windows and other operating systems are available on the
Internet, and most can be very easily set up. In some cases a more advanced commercial version is
available for a modest fee.
•
If you are running the DFL-1000 in NAT mode, the computer running the syslog server must be
connected to the same network as the Internal interface of the DFL-1000
DFL-1000 User’s Manual
114