D-Link DFL-700 User Manual

Page 25

Advertising
background image

Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the

rules.

For more information about how to enable intrusion detection and prevention on a policy

or port mapping, read more under Policies and Port Mappings in the Firewall section below.

Advertising