The synchronization interface .....................................................................27
Setting up a High Availability cluster ...........................................................28
Interface Monitoring ....................................................................................29
Logging ............................................................................................... 30
Enable Logging ...........................................................................................31
Enable Audit Logging ..................................................................................31
Enable E-mail alerting for IDS/IDP events ..................................................31
Time .................................................................................................... 32
Changing time zone ....................................................................................33
Using NTP to sync time...............................................................................33
Setting time and date manually...................................................................33
Firewall..........................................................................................34
Policy................................................................................................... 34
Policy modes...............................................................................................34
Action Types................................................................................................34
Source and Destination Filter......................................................................35
Service Filter ...............................................................................................35
Schedule .....................................................................................................35
Intrusion Detection / Prevention..................................................................36
Traffic Shaping ............................................................................................36
Policy Routing .............................................................................................36
Add a new policy.........................................................................................37
Change order of policy................................................................................38
Delete policy................................................................................................38
Configure Intrusion Detection .....................................................................38
Configure Intrusion Prevention ...................................................................39
Add a new mapping ....................................................................................40
Delete mapping...........................................................................................41
Administrative users............................................................................ 42
Add Administrative User..............................................................................42
Change Administrative User Access level ..................................................43
Change Administrative User Password.......................................................43
Delete Administrative User..........................................................................44
Users................................................................................................... 45
The DFL-1100 RADIUS Support.................................................................45
Enable User Authentication via HTTP / HTTPS..........................................46
Enable RADIUS Support.............................................................................46
Add User .....................................................................................................47
Change User Password ..............................................................................47
Delete User .................................................................................................48
Schedules ........................................................................................... 49
Add new recurring schedule .......................................................................49
Add new one-time schedule........................................................................50
Services .............................................................................................. 51
Adding TCP, UDP or TCP/UDP Service......................................................51
Adding IP Protocol ......................................................................................52
Содержание DFL-1100 - Security Appliance
Страница 1: ...D Link DFL 1100 Network Security Firewall Manual Building Networks for People 04 19 2005 TM ...
Страница 107: ...5 Select Connect to the network at my workplace and click Next ...
Страница 108: ...108 6 Select Virtual Private Network connection and click Next ...
Страница 109: ...7 Name the connection MainOffice and click Next ...
Страница 110: ...110 8 Select Do not dial the initial connection and click Next ...
Страница 111: ...9 Type the IP address to the server 194 0 2 20 and click Next 10 Click Finish ...