![Dinstar SBC1000 User Manual Download Page 58](http://html1.mh-extra.com/html/dinstar/sbc1000/sbc1000_user-manual_2505876058.webp)
3 Configurations on Web Interface
SBC1000 Session Border Controller
Copyright©2011-2018 Dinstar
52
Figure 3-31 IP Security Strategy
Click
to add a strategy to prevent attacks from other IP addresses. Click
to delete a strategy, while
click
to modify the strategy.
Figure 3-32 Add IP Security Strategy
Table 3-29 IP Security Strategy
Time Limiting
The validity time of the IP security strategy. When the validity time expires, the strategy
needs to be retriggered, otherwise it will not takes effect.
Index
The greater digit, the lower priority
Description
The description of the IP security strategy. It cannot be modified after the strategy has been
successfully added.
Detection
Remote IP: when the packet traffic sent by remote IP exceeds the configured traffic threshold
(KBPS) or the CPU usage exceeds the configured threshold, SBC1000 will execute the preset
action.
Local port: when the packet traffic received by local port exceeds the configured traffic
threshold (KBPS) or the CPU usage exceeds the configured threshold, SBC1000 will execute
the preset action.
CPU Usage
The CPU usage rate
If this parameter is null, it means CPU usage is not a condition for triggering security strategy.
Traffic
(
KBPS
)
The maximum packet traffic sent by the peer IP or received by local port. If this threshold is
surpassed, SBC1000 will execute the configured action on the packets.
Summary of Contents for SBC1000
Page 3: ......