D-Link DFL-210-WCF-12 Product Manual - Page 471
Grouping, 10.3.4. Rule Actions, 10.3.5. Multiple Triggered Actions
UPC - 790069601545
View all D-Link DFL-210-WCF-12 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 471 highlights
10.3.3. Grouping Chapter 10. Traffic Management This function is extremely useful when NAT pools are required due to the large number of connections generated by P2P users. 10.3.3. Grouping The two groupings are as follows: • Host Based - The threshold is applied separately to connections from different IP addresses. • Network Based - The threshold is applied to all connections matching the rules as a group. 10.3.4. Rule Actions When a Threshold Rule is triggered one of two responses are possible: • Audit - Leave the connection intact but log the event. • Protect - Drop the triggering connection. Logging would be the preferred option if the appropriate triggering value cannot be determined beforehand. Multiple Actions for a given rule might consist of Audit for a given threshold while the action might become Protect for a higher threshold. 10.3.5. Multiple Triggered Actions When a rule is triggered then NetDefendOS will perform the associated rule Actions that match the condition that has occurred. If more than one Action matches the condition then those matching Actions are applied in the order they appear in the user interface. If several Actions that have the same combination of Type and Grouping (see above for the definition of these terms) are triggered at the same time, only the Action with the highest threshold value will be logged. 10.3.6. Exempted Connections It should be noted that some advanced settings, known as Before Rules settings, can exempt certain types of connections for remote management from examination by the NetDefendOS IP rule set if they are enabled. These Before Rules settings will also exempt the connections from Threshold Rules if they are enabled. 10.3.7. Threshold Rules and ZoneDefense Threshold Rules are used in the D-Link ZoneDefense feature to block the source of excessive connection attmepts from internal hosts. For more information on this refer to Chapter 12, ZoneDefense. 10.3.8. Threshold Rule Blacklisting If the Protect option is used, Threshold Rules can be configured so that the source that triggered the rule, is added automatically to a Blacklist of IP addresses or networks. If several Protect Actions with blacklisting enabled are triggered at the same time, only the first triggered blacklisting Action will be executed by NetDefendOS. A host based Action with blacklisting enabled will blacklist a single host when triggered. A network based action with blacklisting enabled will blacklist the source network associated with the rule. If the Threshold Rule is linked to a service then it is possible to block only that service. When Blacklisting is selected, the administrator can choose to leave pre-existing connections from the triggering source unaffected, or can alternatively choose to have the connections dropped by 471