D-Link DFL-700 Инструкция по эксплуатации онлайн [25/131] 17540

D-Link DFL-700 Инструкция по эксплуатации онлайн [25/131] 17540
When an attack has occurred, more information about the attack can be found. Copy the
attack string and paste it into the By message box at the following address:
http://www.snort.org/cgi-bin/sigs-search.cgi (you can of course also write the attack string
manually in the box).
Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the
rules.
For more information about how to enable intrusion detection and prevention on a policy
or port mapping, read more under Policies and Port Mappings in the Firewall section below.

Содержание

Скачать