RS-1000 Manual - kamery airlive airlivecam
RS-1000 Manual - kamery airlive airlivecam RS-1000 Manual - kamery airlive airlivecam
" Filter IP Source Route Option: Each IP packet can carry an optional fieldthat specifies the replying address that can be different from the sourceaddress specified in packet’s header. Hackers can use this address field ondisguised packets to invade LAN networks and send LAN networks’ data backto them." Detect Port Scan Attack: Select this option to detect the port scans hackersuse to continuously scan networks on the Internet to detect computers andvulnerable ports that are opened by those computers." Detect Land Attack: Some Systems may shut down when receiving packetswith the same source and destination addresses, the same source port anddestination port, and when SYN on the TCP header is marked.Enable this function to detect such abnormal packets.After enabling the needed detect functions, click OK to activate the changes.29
Route TableIn this section, the Administrator can add static routes for the networks.Entering the Route Table screenStep 1. Click System on the left side menu bar, then click Route Table below it. TheRoute Table window appears, in which current route settings are shown.!!Figure1-25 Route TableRoute Table functions" Interface: Destination network , LAN or WAN 1 networks." Destination IP: IP address of destination network." NetMask: Netmask of destination network." Gateway: Gateway IP address for connecting to destination network." Configure: Change settings in the route table.30
- Page 1 and 2: AirLive RS-1000Security Bandwidth M
- Page 3 and 4: Software Update43Interface 44Addres
- Page 5 and 6: Event Alarm151Accounting Report 154
- Page 7 and 8: Multiple NAT Multiple NAT allows lo
- Page 9 and 10: Changing the Main/Sub-Administrator
- Page 11 and 12: Removing a Sub AdministratorStep 1.
- Page 13 and 14: Exporting Security Bandwidth Manage
- Page 15 and 16: Restoring Factory Default SettingsS
- Page 17 and 18: Web Manager (WAN Interface) (Remote
- Page 19 and 20: To-Bandwidth Manager Packets LogOnc
- Page 21 and 22: Date/TimeSynchronizing the Bandwidt
- Page 23 and 24: Permitted IPsOnly the authorized IP
- Page 25 and 26: Modify Permitted IP AddressStep 1.
- Page 27 and 28: Multiple NATMultiple NAT allows loc
- Page 29 and 30: Add Multiple NATStep 1. Click the A
- Page 31 and 32: Delete Multiple NATStep 1. Find the
- Page 33: " Detect ICMP Flood: Select this op
- Page 37 and 38: Modifying a Static Route:Step 1. In
- Page 39 and 40: DHCPIn the section, the Administrat
- Page 41 and 42: Adding a new Host TableSTEP 1.Selec
- Page 43 and 44: How to register:Firstly, Click Dyna
- Page 45 and 46: Modify dynamic DNSStep 1. Find the
- Page 47 and 48: LogoutStep 1. Select this option to
- Page 49 and 50: InterfaceIn this section, the Admin
- Page 51 and 52: !!46
- Page 53 and 54: 48Fixed: Select this if you were gi
- Page 55 and 56: 50After setting all of the paramete
- Page 57 and 58: 52If you want to set up DNS Server,
- Page 59 and 60: AddressThe Security Bandwidth Manag
- Page 61 and 62: Adding a new LAN AddressStep 1. In
- Page 63 and 64: Removing a LAN AddressStep 1. In th
- Page 65 and 66: Adding a LAN GroupStep 1. In the LA
- Page 67 and 68: Removing a LAN GroupStep 1. In the
- Page 69 and 70: Adding a new WAN AddressStep 1. In
- Page 71 and 72: Removing an WAN AddressStep 1. In t
- Page 73 and 74: Adding an WAN GroupStep 1. In the W
- Page 75 and 76: Removing a WAN GroupStep 1. In the
- Page 77 and 78: Pre-definedEntering a Pre-defined w
- Page 79 and 80: 74Use” message will appear in the
- Page 81 and 82: Modifying Custom ServicesStep 1. A
- Page 83 and 84: GroupAccessing the Group windowStep
" Filter IP Source Route Option: Each IP packet can carry an optional fieldthat specifies the replying address that can be different from the sourceaddress specified in packet’s header. Hackers can use this address field ondisguised packets to invade LAN networks and send LAN networks’ data backto them." Detect Port Scan Attack: Select this option to detect the port scans hackersuse to continuously scan networks on the Internet to detect computers andvulnerable ports that are opened by those computers." Detect Land Attack: Some Systems may shut down when receiving packetswith the same source and destination addresses, the same source port anddestination port, and when SYN on the TCP header is marked.Enable this function to detect such abnormal packets.After enabling the needed detect functions, click OK to activate the changes.29