Infinity Wireless Router & AP WZR-G300N Instrukcja Użytkownika Strona 38

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 37
38
Network Configuration (Intrusion Detector)
To enable intrusion detector, choose
Enable or Enable (Apply packet lter rules)
from the Intrusion Detector drop-down
box. If packet lter rules are applied,
packets will be ltered with packet lter
rules before Intrusion Detector is applied.
Blocking IP spoong blocks packets from
devices using an IP address that is not
their own.
In the Threshold Value box, enter the
number of times an event has to occur
before you receive notication.
To congure your email alerts, enter your
email address and mail server information.
You may make up a sender email address,
such as “[email protected]”. Alert emails will appear to come from this address.
Intrusion detector also blocks unauthorized access attempts and suspicious trafc from
WAN-side devices (the internet).
Przeglądanie stron 37
1 2 ... 33 34 35 36 37 38 39 40 41 42 43 ... 90 91

Komentarze do niniejszej Instrukcji

Brak uwag