D-Link DFL-M510 User Manual - Page 43
DMZ Bypass, addresses are not checked and all packets from or to those hosts pass unhindered.
UPC - 790069282478
View all D-Link DFL-M510 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 43 highlights
Information Security Gateway In-Line Bypass Monitor In In-Line mode, the DFL-M510 works as a transparent gateway in your network. All traffic is inspected as it passes through the DFLM510. The DFL-M510 responds to illegal activities based on policy rules. When attacks are detected, the DFL-M510 can take the following action: • Drop the Packet • Reset the Connection • Log the Event • Save the Packet Message Content In Bypass mode, the DFL-M510 works like a bridge with all rules and actions disabled. This mode is designed to help network administrators to debug and trace network abnormalities. When bypass mode is selected, the DFL-M510 will not detect nor take action to security events in the network. Monitor mode allows you to analyze network activities and make early-stage diagnosis before deployment. the DFL-M510 will detect all events by inspecting all packets. In this mode, the DFL-M510 will log all events, but will not take any countermeasure (reset, drop actions). It is suggested to monitor network traffic in this mode before setting In-Line mode, in order to fine tune your security policy and network performance. DMZ BYPASS In order to speed up traffic from the intranet to DMZ, hosts within the given DMZ subnet addresses are not checked and all packets from or to those hosts pass unhindered. Chapter 2: System -- 33