D-Link DFL-2400 Инструкция по эксплуатации онлайн [6/112] 42189

set interface stealth ........................................................................................................................................ 23
set psserver..................................................................................................................................................... 23
set state...........................................................................................................................................................25
set snmp.......................................................................................................................................................... 25
MISCELLANEOUS COMMANDS............................................................................................................................ 26
ping ................................................................................................................................................................ 26
arp .................................................................................................................................................................. 27
netstat ............................................................................................................................................................. 27
reset................................................................................................................................................................ 28
reboot ............................................................................................................................................................. 28
4 IDS MANAGEMENT SYSTEM ............................................................................................................. 29
DFL-2100/2400 IDS MANAGEMENT MAIN SCREEN .......................................................................................... 29
Login .............................................................................................................................................................. 29
DFL-2100/DFL-2400 Management System Main Screen..............................................................................30
MANAGE DFL-2100/DFL-2400......................................................................................................................... 30
Add a DFL-2100/DFL-2400 .......................................................................................................................... 31
Remove a DFL-2100/DFL-2400 .................................................................................................................... 32
Modify a DFL-2100/DFL-2400...................................................................................................................... 32
DFL-2100/DFL-2400 CONFIGURE AND SETTING ............................................................................................... 33
DFL-2100/DFL-2400 Device Information..................................................................................................... 33
Setting DFL-2100/DFL-2400 parameters...................................................................................................... 33
USER MANAGE................................................................................................................................................... 34
Add new user.................................................................................................................................................. 35
Delete user ..................................................................................................................................................... 36
Edit user .........................................................................................................................................................36
IDS MANAGEMENT SYSTEM MISCELLANEOUS FUNCTIONS ................................................................................. 38
Export Books .................................................................................................................................................. 38
Import Books .................................................................................................................................................. 39
Print Books..................................................................................................................................................... 40
DFL-2100/DFL-2400 IDS Reporting System................................................................................................. 41
About DFL-2100/DFL-2400 IDS Management System ................................................................................. 41
5 POLICY BASED IDS ............................................................................................................................... 42
WHAT IS A POLICY? ...........................................................................................................................................42
THE POLICY BOOK ............................................................................................................................................. 42
Load latest attack pattern............................................................................................................................... 43
Change the Priority of Policies...................................................................................................................... 45
NETWORK DEFENSE POLICIES DATABASE.......................................................................................................... 46
SELECT DEFENSE POLICY...................................................................................................................................47
Select a Defense Policy ..................................................................................................................................47
Policy Attribute .............................................................................................................................................. 49
DEFENSE POLICY................................................................................................................................................50
Define Policy Protect Scope...........................................................................................................................50
Set DDoS Parameters .................................................................................................................................... 51
Define Policy Actions..................................................................................................................................... 52
Define Policy Action Schedule .......................................................................................................................53
6 DEFINE YOUR OWN DEFENSE POLICY .................................................................... 54
DEFINE YOUR OWN DEFENSE POLICY................................................................................................................ 54
FILL DEFENSE POLICY ATTRIBUTES ................................................................................................................... 56
DETERMINE THE RECOGNIZE CONDITION........................................................................................................... 57
DETERMINE THE ACTION WHILE BEING ATTACKED .......................................................................................... 57
PICK UP THE SCHEDULE ..................................................................................................................................... 57
DESCRIPTION:..................................................................................................................................................... 58
FILL THE PACKET CRITERIA ............................................................................................................................... 59
The Comparison Operations.......................................................................................................................... 59
The IP Tab......................................................................................................................................................60
The TCP Tab ..................................................................................................................................................61

Содержание

Скачать