The shared IP address and the failover mechanism ..................................25
Cluster heartbeats.......................................................................................26
The synchronization interface .....................................................................26
Setting up a High Availability cluster ...........................................................27
Interface Monitoring ....................................................................................28
Logging ............................................................................................... 29
Enable Logging ...........................................................................................30
Enable Audit Logging ..................................................................................30
Enable E-mail alerting for ISD/IDP events ..................................................30
Time .................................................................................................... 32
Changing time zone ....................................................................................33
Using NTP to sync time...............................................................................33
Setting time and date manually...................................................................33
Firewall..........................................................................................34
Policy................................................................................................... 34
Policy modes...............................................................................................34
Action Types................................................................................................34
Source and Destination Filter......................................................................35
Service Filter ...............................................................................................35
Schedule .....................................................................................................35
Intrusion Detection / Prevention..................................................................35
Traffic Shaping ............................................................................................36
Policy Routing .............................................................................................36
Add a new policy.........................................................................................38
Change order of policy................................................................................39
Delete policy................................................................................................39
Configure Intrusion Detection .....................................................................39
Configure Intrusion Prevention ...................................................................40
Port mapping / Virtual Servers ............................................................ 41
Add a new mapping ....................................................................................41
Delete mapping...........................................................................................42
Administrative users............................................................................ 43
Add Administrative User..............................................................................43
Change Administrative User Access level ..................................................44
Change Administrative User Password.......................................................44
Delete Administrative User..........................................................................45
Users................................................................................................... 46
The DFL-1100 RADIUS Support.................................................................46
Enable User Authentication via HTTP / HTTPS..........................................47
Enable RADIUS Support.............................................................................47
Add User .....................................................................................................48
Change User Password ..............................................................................48
Delete User .................................................................................................49
Schedules ........................................................................................... 50
Add new recurring schedule .......................................................................50