Source: port, Black list – D-Link DFL-600 User Manual

Page 105

Advertising
background image

Source: port

The IP address and TCP/UDP port num
computer or device that initiated the s
displayed here.

Destination: port

The IP address and TCP/UDP port num
computer or device that
initiation is displayed here.

ber of the

responded to the session

Type

The protocol used to conduct the session is

ber of the

ession is

displayed here.

Terminate Reason

ated, it is displayed

When the session is termin
here.

Black List

The DFL-600’s firewall is

nd block many

commonly used intrusion methods from computers on the WAN (Internet),
from one computer to another on the LAN, and from computers on your LAN

addition, you can define a Port Filter Policy that will set

s.

f

e protocol used, and the corresponding port

umber is determined and entered into the DFL-600’s Intruder Blacklist.

nce the intruder’s information is entered, the DFL-600’s firewall will block

packets from this location from crossing the DFL-600 (from the WAN to the
LAN, from two computers on the LAN, or from the LAN to the WAN).

Once an intruder’s IP address is listed in the Intruder Blacklist, it will remain
until it times out. Each new intrusion attempt will reset the timer, and the

pre-programmed to recognize a

to the WAN. In
additional intrusion criteria for the DFL-600’s firewall to block connection
When a serious intrusion attempt is detected (that is, when a large number o
packets consistent with a commonly used intrusion method are detected by

he DFL-600) the IP address, th

t
n
O

Advertising