D-Link DSR-250v2 Product Manual - Page 70

General

Page 70 highlights

Starting IP address Ending IP address Schedule policy Apply Cancel If you select IP range then enter the staring IP address If you select IP range then enter the ending IP address It allows you to define the time and day when the traffic shaping rule is to be applied. Click apply to save your settings. Click cancel to revert to the previous settings. Chapter 6 Firewall This chapter introduces you to the security features supported by the router. These features include Firewall and IPS/IDS. These are the various techniques used to block any malicious attacks from the Internet to access your network. You can also configure your own Internet policies to allow only selected web-based information. This chapter covers the following topics: Firewall settings Attack check Application layer gateways UPnP Firewall policy IPv4 Firewall Rules Port Forwarding Port Triggering Firewall Settings In firewall setting you can configure IPS/IDS to prevents malicious attacks from the Internet from accessing the private network and ALGs that enhance the firewall and NAT support of the Router. General The router's Intrusion Prevention System (IPS) prevents malicious attacks from the Internet from accessing the private network. Static attack signatures loaded to the router allow common attacks to be detected and prevented. In addition, you can enable checks between the WAN and DMZ or LAN. The fields available on this page are as follows: Field Intrusion detection Description Intrusion detection/prevention Enable or disable intrusion detection.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

Starting IP address
If you select IP range then enter the staring IP address
Ending IP address
If you select IP range then enter the ending IP address
policy
Schedule
It allows you to define the time and day when the traffic shaping rule is to be applied.
Apply
Click
to save your settings.
apply
Cancel
Click
to revert to the previous settings.
cancel
Chapter 6 Firewall
This chapter introduces you to the security features supported by the router. These features include Firewall and IPS/IDS. These are the various
techniques used to block any malicious attacks from the Internet to access your network. You can also configure your own Internet policies to
allow only selected web-based information.
This chapter covers the following topics:
Firewall settings
Attack check
Application layer gateways
UPnP
Firewall policy
IPv4 Firewall Rules
Port Forwarding
Port Triggering
Firewall Settings
In firewall setting you can configure IPS/IDS to prevents malicious attacks from the Internet from accessing the private network and ALGs that
enhance the firewall and NAT support of the Router.
General
The router’s Intrusion Prevention System (IPS) prevents malicious attacks from the Internet from accessing the private network. Static attack
signatures loaded to the router allow common attacks to be detected and prevented. In addition, you can enable checks between the WAN and
DMZ or LAN.
The fields available on this page are as follows:
Field
Description
Intrusion detection/prevention
Intrusion detection
Enable or disable intrusion detection.