DPtech WCS 7000 Series Wireless Access Controller User Configuraiton Guide
84
Enter a name for the defend object management rule
On the defend object management rule page, you should configure IP address and subnet mast to be protected
After the above steps is finished, click
Ok
button in the upper right corner on the webpage.
5.9.2 Configuration and Tendency
5.9.2.1 Traffic Status and Monitoring
You can access the current defend group traffic status and monitoring via configuration and tendency.
Select
AC> Firewall > Basic DDoS Protection > Configuration and tendency
from navigation tree to enter the
traffic status and monitoring page, as shown in Figure5-19.
Figure5-19
Traffic status and monitoring
Table5-13 describes the configuration items of traffic status and monitoring.
Table5-13
Traffic and status monitoring configuration items
Item
Description
Name
Displays the name of traffic status monitoring.
IP address
Displays the IP address of traffic monitoring.
Belong to
Displays which protect type belong to.
Time range
Displays the status time range.
5.9.2.2 DDOS Defend Settings
DDOS defend settings is the basic configuration to all kind of attack.
Select
AC> Firewall > Basic DDOS Protection > DDOS defend settings
from navigation to enter the DDoS
defend settings page, as shown in Figure5-20.