D-Link DFL-2400 [12/112] Network architecture

D-Link DFL-2400 [12/112] Network architecture
DFL-2100/DFL-2400 Intrusion Detection System User Manual
2
Within built-in anomaly detection model, DFL-2100/DFL-2400 can detect potential
attacks.
By taking advantage of flexible policies, DFL-2100/DFL-2400 can be updated to
detect new attack instantly that reduces the exposure time of attack cycle.
Reporting feature:
Organized reporting and event trace back provides a clear view of what happened
on the network.
Long-term events management.
Logged packet header decoding.
Template based printing function that fits the need of different level of
management.
Network Architecture
DFL-2100/DFL-2400 is a transparent device and it does not change the network
architecture. A Policy Server with DFL-2100/DFL-2400 Management System and DFL-
2100/ DFL-2400 Reporting System provides a very friendly user-interface to configure
DFL-2100/DFL-2400. Administrators could use DFL-2100/ DFL-2400 Management
System to set up some policies for their network architecture. Policy server can
manages multiple DFL-2100/DFL-2400s concurrently, and receive system logs, attack
events from DFL-2100/DFL-2400s.
Figure 1-1: DFL-2100/DFL-2400 IDS Network Architecture

Содержание

Скачать