D-Link DFL-200 Riding Toy User Manual


 
24
Intrusion attacks will always be logged in the usual logs if IDS is enabled for any of the
rules. For more information about how to enable intrusion detection and prevention on a
policy or port mapping, read more under Policies and Port Mappings in the Firewall section
below.