
164
Figure 163
Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in
, internal users Host A, Host B, and Host C access the Internet through Router. The
network security requirements are as follows:
•
Router always drops packets from Host D, an attacker.
•
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
•
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
•
Router provides Land attack protection and Smurf attack protection.
Summary of Contents for MSR SERIES
Page 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Page 20: ...3 Figure 3 Initial page of the Web interface ...
Page 42: ...25 Figure 13 Firefox Web browser setting ...
Page 59: ...42 Figure 27 Checking the basic service configuration ...
Page 73: ...56 Figure 35 Sample interface statistics ...
Page 156: ...139 Figure 139 Rebooting the 3G modem ...
Page 168: ...151 Figure 152 Configuring Web server 2 ...
Page 174: ...157 Figure 158 Configure the URL filtering function ...
Page 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Page 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Page 255: ...238 Figure 241 Advanced limit setting ...
Page 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Page 400: ...383 Figure 387 Verifying the configuration ...
Page 405: ...388 ...
Page 523: ...506 Figure 530 Ping configuration page ...
Page 775: ...758 Figure 785 Configuring a jump node ...