D-Link DFL-260E Reference Manual page 192

Network security firewall cli
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

Description
An IDP Rule Action specifies what signatures to search for in the network traffic, and what action
to take if those signatures are found.
Properties
Action
Signatures
ZoneDefense
BlackList
BlackListTimeToBlock
BlackListBlockOnlyService
BlackListIgnoreEstablished
PipeLimit
PipeNetwork
PipeNewConnections
PipeTimeWindow
LogEnabled
LogSeverity
Comments
Note
If no Index is specified when creating an instance of this type, the object will be placed
last in the list and the Index will be equal to the length of the list.
Chapter 3: Configuration Reference
Specifies what action to take if the given signature
is found. (Default: Audit)
Specifies what signature(s) to search for in the
network traffic. (Optional)
Activate ZoneDefense. (Default: No)
Activate BlackList. (Default: No)
The number of seconds that the dynamic black list
should remain. (Optional)
Only block the service that triggered the
blacklisting. (Default: No)
Do not drop existing connection. (Default: No)
Specifies the bandwidth limit in kbps for hosts
triggered by this action.
Traffic shaping will only apply to hosts that are
within this network. (Default: 0/0)
Enable piping of new connections from and to the
same host. (Default: No)
Throttling of new connections to and from the
triggering host will stop after the configured
amount of time. (Default: 10)
Enable logging. (Default: Yes)
Specifies with what severity log events will be sent
to the specified log receivers. (Default: Default)
Text describing the current object. (Optional)
192

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560gDfl-870Dfl-860eDfl-1660Dfl-2560

Table of Contents