D-Link DFL-M510 User Manual page 45

Information security gateway
Hide thumbs Also See for DFL-M510:
Table of Contents

Advertisement

1. Type in the IP address and the Subnet mask of the mail server.
2. Click Save .
H
/G
B
OST
ROUPS
YPASS
Hosts within the intranet which do not need to be monitored are added to the Bypassed User/
Group. These hosts have unhindered access to the WAN, but may be less secure than In-Line
hosts.
NOTE
The IP addresses of the hosts in the bypass list must
be in the host table first. That is, the host must be
learned or entered before you can select it. Otherwise,
the host must be within a group and specified by a
subnet. Such a host is automatically added to the
bypass list when it is learned.
Information Security Gateway
Chapter 2: System -- 35

Advertisement

Table of Contents
loading

Table of Contents