![Dinstar SBC300 User Manual Download Page 55](http://html1.mh-extra.com/html/dinstar/sbc300/sbc300_user-manual_2505877055.webp)
3 Configurations on Web Interface
SBC300 Session Border Controller
Copyright©2011-2018 Dinstar
49
3.5
Security
In the
Security
section, you can configure the system security strategies, anti-attack strategies and access control
strategies.
System
System security is mainly used to prevent SBC300 from being attacked by various DOS/DDOS floods, so as to
ensure stable running of the device.
Figure 3-29 System Security
Table 3-27 System Security
Attack Log
If ‘Attack Log’ is enabled and SBC300 is attacked, the device will record
the attack in logs which can be viewed on the
Maintenance
Log
Security Log
page.
ICMP-Flood
ICMP-Flood is a kind of DDOS attack. It can send a mass of ICMP packets
to attack the SBC300 device.
If this parameter is enabled, the device will drop those packets whose
transmission rate exceeds the configured value of peak PPS(Packet Per
Second); the range of the peak PPS is from 1 to 1000.
PING of Death
If this parameter is enabled, the SBC300 device will not give response to
the PING request sent by devices in public network. It is disabled by
default.
UDP-Flood
UDP-Flood is a kind of DDOS attack. It can send a mass of UDP packets
to attack the SBC300 device.
If this parameter is enabled, the device will drop those packets whose
transmission rate exceeds the configured value of peak PPS (Packet Per
Second); the range of the peak PPS is from 1 to 1000.
TCP-NULL
TCP NULL is a scan to determine if ports are closed on the target device.