D-Link DFL-200 manual

Models: DFL-200

1 133
Download 133 pages 54.3 Kb
Page 24
Image 24

Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the rules. For more information about how to enable intrusion detection and prevention on a policy or port mapping, read more under Policies and Port Mappings in the Firewall section below.

24

Page 24
Image 24
D-Link DFL-200 manual