D-Link DFL-700 manual

Models: DFL-700

1 141
Download 141 pages 4.85 Kb
Page 25
Image 25

Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the rules.

For more information about how to enable intrusion detection and prevention on a policy or port mapping, read more under Policies and Port Mappings in the Firewall section below.

Page 25
Image 25
D-Link DFL-700 manual