Eim - D-Link DFL-M510 User Manual

Information security gateway
Hide thumbs Also See for DFL-M510:
Table of Contents

Advertisement

Information Security Gateway
Tunnels are host-based software. They provide a secure channel for communication. The purpose
is to break through a firewall and escape content inspecting. For example, like soft ether, VNN,
and VNC.

EIM

The EIM table provides layer seven monitoring. A packet is classified by its application pattern
and summarized into six categories: IM, P2P, Web application, file transfer, E-mail, and media.
If a host is connecting to the Internet and identified as a category application, the table shows a
check mark to indicate the host is currently running the application with that specific category.
Chapter 5: Real Time Monitor -- 83

Advertisement

Table of Contents
loading

Table of Contents