|
Welcome to Use Online Help
Conventions
Safety Information
Function Differences Between Versions
Alarm
Initial Configuration of the Management Center
Configuring Inbound Rules for the Windows Firewall Function
Logging In to the ATIC Management center
Customizing a Homepage
Adding Devices
(Optional) Configuring an Collector
(Optional) Configuring the Defense Group
Configuring Defense Policies
Configuring Traffic Diversion
Attack Response and Source Tracing
Report
System Management
Syslog Encryption Configuration Example
|