![D-Link DFL-1600 - Security Appliance Скачать руководство пользователя страница 504](http://html.mh-extra.com/html/d-link/dfl-1600-security-appliance/dfl-1600-security-appliance_user-manual_75084504.webp)
Chapter 12. ZoneDefense
This chapter describes the D-Link ZoneDefense feature.
• Overview, page 504
• ZoneDefense Switches, page 505
• ZoneDefense Operation, page 506
12.1. Overview
ZoneDefense Controls Switches
ZoneDefense allows a NetDefend Firewall to control locally attached switches. It can be used as a
counter-measure to stop a virus-infected computer in a local network from infecting other
computers.
When hosts or clients on a network become infected with viruses or another form of malicious code,
this can often show its presence through anomalous behavior, often by large numbers of new
connections being opened to outside hosts.
Using Thresholds
By setting up Threshold Rules, hosts or networks that are exceeding a defined connection threshold
can be dynamically blocked using the ZoneDefense feature. Thresholds are based on either the
number of new connections made per second, or on the total number of connections being made.
These connections may be made by either a single host or all hosts within a specified CIDR network
range (an IP address range specified by a combination of an IP address and its associated network
mask).
ACL Upload
When NetDefendOS detects that a host or a network has reached the specified limit, it uploads
Access Control List (ACL) rules to the relevant switches and this blocks all traffic for the host or
network displaying the unusual behavior. Blocked hosts and networks remain blocked until the
system administrator manually unblocks them using the Web or Command Line interface.
Note: ZoneDefense is not available on all NetDefend models
The ZoneDefense feature is only available on the D-Link NetDefend DFL-800, 860,
860E, 1600, 1660, 2500, 2560 and 2560G.
504
Содержание DFL-1600 - Security Appliance
Страница 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Страница 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Страница 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Страница 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Страница 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Страница 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Страница 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Страница 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Страница 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Страница 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Страница 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Страница 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Страница 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Страница 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Страница 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...