|
Welcome to Use Online Help
Conventions
Safety Information
Function Differences Between Versions
Alarm
Initial Configuration of the Management Center
Configuring Inbound Rules for the Windows Firewall Function
Logging In to the ATIC Management center
Customizing a Homepage
Adding Devices
Creating an AntiDDoS
Creating an Syslog-linkage Device
(Optional) Configuring an Collector
(Optional) Configuring the Defense Group
Configuring Defense Policies
Configuring Traffic Diversion
Attack Response and Source Tracing
Report
System Management
Syslog Encryption Configuration Example
|