D-Link DFL-1000 User Manual page 6

Hide thumbs Also See for DFL-1000:
Table of Contents

Advertisement

High level virus protection for incoming connections ......................................................................... 74
Medium level virus protection for incoming connections.................................................................... 75
Low level virus protection for incoming connections .......................................................................... 76
Worm protection for incoming connections ........................................................................................ 76
Updating your antivirus database ........................................................................................................... 77
Updating the antivirus database manually ......................................................................................... 77
Configuring automatic antivirus database updates ............................................................................ 77
Displaying virus and worm lists .............................................................................................................. 78
Web content filtering ...............................................................................79
Blocking web pages that contain undesired words ................................................................................ 79
Enabling the banned word list ............................................................................................................ 79
Adding words to the banned word list ................................................................................................ 79
Temporarily disabling the banned word list ........................................................................................ 80
Temporarily disabling individual words in the banned word list ......................................................... 80
Clearing the banned word list............................................................................................................. 80
Creating the banned word list using a text editor ............................................................................... 80
Blocking access to Internet sites ............................................................................................................ 81
Enabling the URL block list................................................................................................................. 81
Adding URLs to the URL block list ..................................................................................................... 81
Temporarily disabling the URL block list ............................................................................................ 81
Temporarily disabling blocking individual URLs................................................................................. 81
Clearing the URL block list ................................................................................................................. 82
Creating the URL block list using a text editor ................................................................................... 82
Removing scripts from web pages ......................................................................................................... 82
Logging and reporting.............................................................................84
Configuring logging................................................................................................................................. 84
Recording logs on a remote computer ............................................................................................... 84
Selecting what to log .......................................................................................................................... 85
Log message formats ............................................................................................................................. 85
Traffic log message format ................................................................................................................. 86
Event log message format.................................................................................................................. 86
Attack log message format ................................................................................................................. 87
Viewing and maintaining logs ................................................................................................................. 88
Viewing logs ....................................................................................................................................... 88
Searching logs.................................................................................................................................... 89
Downloading a log file to the management computer ........................................................................ 89
Deleting all of the messages in an active log ..................................................................................... 90
Deleting a saved log file ..................................................................................................................... 90
Administering the DFL-1000 ...................................................................91
Logging into the web-based manager .................................................................................................... 91
System status ......................................................................................................................................... 91
Changing the operating mode ............................................................................................................ 92
DFL-1000 User's Manual
6

Advertisement

Table of Contents
loading

Table of Contents