Figure 133. Wids Malicious Rule Configuration Window - Samsung WEC8500 Operation Manual

Access point controller
Hide thumbs Also See for WEC8500:
Table of Contents

Advertisement

2600-00FK1RGA4
Ver.
3) To check the configured information, use the 'show wids rogue rule malicious'
command.
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Rogues>  <Policy>  <User Defined Rule> menu in the sub-menus. And then, select
<Malicious> at the upper tab.
1) By using Add, Delete, or Change, operator can add, delete, or change user defined rules.
2) In the rule addition screen, operator can add a rule by entering the information and
click Apply.
© SAMSUNG Electronics Co., Ltd.
3.0

Figure 133. WIDS Malicious Rule Configuration Window

Figure 134. WIDS Malicious Rule Addition Window
CHAPTER 8. Security
page 286 of 496

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wec8050

Table of Contents