Download Print this page

D-Link DFL-M510 Faq page 3

Hide thumbs Also See for DFL-M510:

Advertisement

Q: Why does RTM show no data?
Q: How many bytes are transferred from DFL-M510 to the PC for RTM?
Q: How often is the data refreshed in Real Time Application?
Q: What are the main features of RTM in DFL-M510?
Q: Is it possible to identify the victim infected malicious problem with RTM?
Q: How does H.323 work? By port? By protocol?
Q: How many P2P applications can the DFL-M510 manage?
Q: What's the difference between HTTP and web control in real-time application?
Q: Does Web Content keyword block ASCII code content? How does it work?
Q: What is the limitation to detect and block Skype?
Q: How does "Web Download" work? Are there any constraints?
Q: Does "Web Mail" pattern only detect the URL?
Q: Is there any detail Application list spported by the DFL-M510?
Q: How does DFL-M510 manage Streaming Media Applications?
Q: Why can the DFL-M510 only block or allow Skype / QQ? Is there no granular action control?
Q: How does DFL-M510 manage normal FTP and FTP applications like GETRight/FlashGet?
Q: Is the signature unidirectional or bidirectional?
MISC
Q: What happens after DFL-M510 blocks/detects malicious traffic?
Q: Is there any SNMP Set/Get/Trap list?
D-Link Nordic Technical Support
3

Advertisement

loading