D-Link DBG-2000 Product Manual - Page 82
Security
View all D-Link DBG-2000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 82 highlights
DBG-2000 User Guide The fields available on the VRRP configuration page are as follows: Field VRRP ID Interface IP address Node type Priority Save Cancel Description Specify an ID to the VRRP router. Select the interface on which you want to configure VRRP. Enter the IP address of the VRRP router. Select the node type for the VRRP router. Select Master if you want the VRRP router to work as a master, and select Backup if you want it to be the backup router. It indicates the priority given to the respective router. If the master is unavailable, then the highest priority Backup will transit to Master, providing a controlled transition of the virtual router responsibility with minimal service interruption. Click Save to save your settings. Click Cancel to revert to previous settings. Chapter 4 Security This chapter introduces you to the security features supported by the Nuclias cloud gateway. These features include Firewall, IPS, Web content filtering, and Application control. These are the various techniques used to block any malicious attacks from the Internet to access your network. You can also configure your own Internet policies to allow only selected web-based information. This chapter covers the following topics: Firewall The Firewall section of the Security deals with the various methods adopted by the Nuclias cloud gateway to ensure a safe and secure network. In this section, you will learn about the Firewall rules configuration on the IPv4 networks. These are the rules defined to keep a check on the incoming and outgoing traffic of the network. You can state which traffic is to be allowed or blocked. Similarly, the Port Forwarding method can restrict access to traffic entering your network while allowing only specific outside users to access specific local resources. When you have multiple public IP addresses and multiple servers across the firewall, the 1:1 NAT method is used. This section covers the following topics: Expand all Collapse all IPv4 Firewall Rules 82