384
Detect Ping of Death Attack:
Select this option to detect the attacks of tremendous trash data in PING
packets that hackers send to cause System malfunction. This attack can
cause network speed to slow down, or even make it necessary to restart the
computer to get a normal operation.
Detect IP Spoofing Attack:
Select this option to detect spoof attacks. Hackers disguise themselves as
trusted users of the network in Spoof attacks. They use a fake identity to
try to pass through the ALL7008 System and invade the network.
Detect Port Scan Attack:
Select this option to detect the port scans hackers use to continuously scan
networks on the Internet to detect computers and vulnerable ports that are
opened by those computers.
Detect Tear Drop Attack:
Select this option to detect tear drop attacks. These are packets that are
segmented to small packets with negative length. Some Systems treat the
negative value as a very large number, and copy enormous data into the
System to cause System damage, such as a shut down or a restart
.
Filter IP Route Option:
Each IP packet can carry an optional field that specifies the replying address
that can be different from the source address specified in packet’s header.
Hackers can use this address field on disguised packets to invade LAN
networks and send LAN networks’ data back to them.
Summary of Contents for ALL7008
Page 1: ...ALL7008 User s Manual...
Page 5: ...4 Chapter21 Status 423 Interface 424 Authentication 426 ARP Table 427 DHCP Clients 428...
Page 13: ...12...
Page 36: ...35 STEP 4 Complete PPTP VPN Connection Figure 2 20 Figure 2 20 PPTP VPN Connection Setting...
Page 43: ...42...
Page 55: ...54 Figure3 8 Complete Dynamic IP Connection Setting...
Page 83: ...82...
Page 85: ...84 Figure7 2 the Flow After Using QoS Max Bandwidth 400Kbps Guaranteed Bandwidth 200Kbps...
Page 114: ...113 STEP 10 Select Ethernet Figure8 23 Figure8 23 Add New Remote Access Policy Method...
Page 119: ...118 STEP 15 Add Service Type Figure8 28 Figure8 28 Add New RADIUS Attribute...
Page 145: ...144...
Page 165: ...164...
Page 191: ...190 STEP 8 Click on Next Figure11 39 Figure11 39 Enable IP Security Policy...
Page 260: ...259 STEP 4 Complete PPTP VPN Connection Figure11 128 Figure11 128 PPTP VPN Connection Setting...
Page 274: ...273 Figure11 142 PPTP VPN Connection Complete...
Page 301: ...300...
Page 343: ...342 Figure14 34 Create Folder WebUI...
Page 345: ...344 Figure14 36 Select Folder for Spam Mail to move to...
Page 347: ...346 Figure14 38 Compact SpamMail Folder...
Page 349: ...348 Figure14 40 Copy the File Address that SpamMail File Store...
Page 353: ...352 Figure14 43 Confirm that All of the Mail in SpamMail File had been Deleted...
Page 355: ...354 Figure14 45 Create Folder Function WebUI...
Page 357: ...356 Figure14 47 Select the Folder for Needed Spam Mail to Move to...
Page 359: ...358 Figure14 49 Compact HamMail File...
Page 361: ...360 Figure14 51 Copy the File Address that HamMail File Store...
Page 364: ...363 Figure14 54 Make Sure all of the Mails in HamMail File had been Deleted...
Page 365: ...364...
Page 381: ...380...
Page 389: ...388 Figure16 4 NetBIOS Alert Notification to Administrator s PC...
Page 390: ...389 Figure16 5 E mail Virus Alert...
Page 391: ...390...
Page 397: ...396...
Page 413: ...412...
Page 417: ...416...
Page 426: ...425 Figure21 1 Interface Status...
Page 430: ...429...