D-Link DFL-260E Manual page 118

Network security firewall netdefendos version 2.40.00
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

3.24.1. IDPRuleAction
An IDP Rule Action specifies what signatures to search for in the network traffic, and what action to
take if those signatures are found.
Properties
Action
Signatures
BlackList
BlackListTimeToBlock
BlackListBlockOnlyService
BlackListIgnoreEstablished
PipeLimit
PipeNetwork
PipeNewConnections
PipeTimeWindow
LogEnabled
LogSeverity
Comments
Note
If no Index is specified when creating an instance of this type, the object will be
placed last in the list and the Index will be equal to the length of the list.
Chapter 3. Configuration Reference
Specifies what action to take if the given signature is
found. (Default: Audit)
Specifies what signature(s) to search for in the net-
work traffic. (Optional)
Activate BlackList. (Default: No)
The number of seconds that the dynamic black list
should remain. (Optional)
Only block the service that triggered the blacklisting.
(Default: No)
Do not drop existing connection. (Default: No)
Specifies the bandwidth limit in kbps for hosts
triggered by this action.
Traffic shaping will only apply to hosts that are
within this network. (Default: 0/0)
Enable piping of new connections from and to the
same host. (Default: No)
Throttling of new connections to and from the trig-
gering host will stop after the configured amount of
time. (Default: 10)
Enable logging. (Default: Yes)
Specifies with what severity log events will be sent
to the specified log receivers. (Default: Default)
Text describing the current object. (Optional)
118

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-860eDfl-1660Dfl-2560Dfl-2560g

Table of Contents