Low Level Virus Protection For Incoming Connections; Worm Protection For Incoming Connections - D-Link DFL-1000 User Manual

Hide thumbs Also See for DFL-1000:
Table of Contents

Advertisement

Scan
Click OK and click Apply.
Go to Anti-Virus > SMTP > Incoming and repeat steps
downloaded from your web server to users on the Internet.
medium level virus protection to virus scan target files in email attachments in SMTP traffic originating
from your internal or DMZ network.
Go to Anti-Virus > POP3 > Incoming and repeat steps
downloaded from your web server to users on the Internet.
medium level virus protection to virus scan target files in email attachments in POP3 traffic originating
from your internal or DMZ network.
Go to Anti-Virus > IMAP > Incoming and repeat steps
downloaded from your web server to users on the Internet.
medium level virus protection to virus scan target files in email attachments in IMAP traffic originating
from your internal or DMZ network.
When the DFL-1000 detects a virus and removes the infected file, the user who requested the file receives a
message similar to the following:
Sorry, Dangerous Attachment has been removed.
It was infected with the "Generic VBA Virus" virus

Low level virus protection for incoming connections

Incoming low level protection suspends virus protection. All target files are forwarded unchanged to their
destinations.
To configure incoming low level protection:
Go to Anti-Virus > HTTP > Incoming.
Click Low to turn off virus scanning for Internet web pages.
Click Apply.
Go to Anti-Virus > SMTP > Incoming and repeat steps
Internet web pages.
Go to Anti-Virus > POP3 > Incoming and repeat steps
Internet web pages.
Go to Anti-Virus > IMAP > Incoming and repeat steps
web pages.
and
Click Apply.

Worm protection for incoming connections

When configured for worm scanning, the virus scanning engine checks HTTP requests for worms by
scanning their originating web page for known worm patterns. For example, Code Red attempts to gain
entry to MS IIS servers by trying to exploit a known buffer overflow bug in these servers.
To scan SMTP, POP3, and IMAP email attachments for worms, the virus scanning engine looks for
filenames known to be used by worms. For example, the Nimda worm uses files named readme.exe and
sample.exe.
If the virus scanning engine detects a worm, the file is deleted and replaced with an alert message.
To prevent the distribution of worms from servers on your internal and DMZ networks to the Internet:
Go to Anti-Virus > HTTP > Incoming.
Click Worm Protection to scan content from web servers on your internal or DMZ network for worms
before that content passes through the firewall.
Click Apply.
DFL-1000 User's Manual
and
Click Apply.
to turn off virus scanning for email attachments in SMTP traffic.
and
Click Apply.
to turn off virus scanning for email attachments in POP3 traffic.
to turn off virus scanning for email attachments in IMAP traffic.
Click Medium to virus scan target files
to
Click OK and click Apply.
Click Medium to virus scan target files
to
Click OK and click Apply.
Click Medium to virus scan target files
to
Click OK and click Apply.
Click Low to turn off virus scanning for
Click Low to turn off virus scanning for
Click Low to turn off virus scanning for Internet
to configure
to configure
to configure
76

Advertisement

Table of Contents
loading

Table of Contents