Vigor3900 Series User’s Guide
428
4
4
.
.
1
1
4
4
.
.
6
6
.
.
3
3
A
A
c
c
c
c
e
e
s
s
s
s
B
B
a
a
r
r
r
r
i
i
e
e
r
r
This page is used to configure the access barrier to protect the system from brute-force attack
and flooding attack, and ensure following protocols can run properly.
Available parameters are listed as follows:
Item Description
Syslog
Check the box to make information related to access control
recorded on Syslog.
PPTP/IPsec/Web/HTTPS
SSH/Telnet/FTP Access
Barrier
The port number used by these protocols always became the
target attacked by hacker. Therefore, the settings for packet
reception rate for certain protocol can be configured to avoid
attack from unknown people.
Apply
Click this button to save the configuration.
Cancel
Click it to discard the settings configured in this page.
VoIPon www.voipon.co.uk [email protected] Tel: (0)330 088 0195 Fax: +44 (0)1245 808299