![AirLive RS-2500 Скачать руководство пользователя страница 192](http://html.mh-extra.com/html/airlive/rs-2500/rs-2500_user-manual_2877807192.webp)
21. Anomaly Flow IP
187
AirLive RS-2500 User’s Manual
ing IP Address continuously.
sting, your network is experiencing an
determine it as an attack.
r Source IP) Seconds
】
: When
RS-2500 determines as being attacked, it will block the attacking source IP in
you set. After blocking for certain seconds, the device will
continuously.
ack can cause network
twork in Spoof attacks. They use a fake identity to try to pass
source IP Address. And if the max number still exceed the define value, it will
block the attack
Detect UDP Flood:
When Hackers continuously send PING packets to all the machines of the LAN
networks or to the RS-2500 via broadca
UDP attack.
【
UDP Flood Threshold (Total) Pkts/Sec
】
: The System Administrator can
enter the maximum number of UDP packets per second that is allow to enter
the network/RS-2500. If the value exceeds the setting one, and then the
device will
【
UDP Flood Threshold (Per Source IP) Pkts/Sec
】
: The System
Administrator can enter the maximum number of UDP packets per second
from attacking source IP Address that is allow to enter the network/RS-2500.
If the value exceeds the setting one, and then the device will determine it as
an attack.
【
UDP Flood Threshold Blocking Time (Pe
the blocking time
start to calculate the max number of UPD packets from attacking source IP. If
the max number still exceed the define value, it will block the attacking IP
Address
Detect Ping of Death Attack:
Select this option to detect the attacks of tremendous trash data in PING packets
that hackers send to cause System malfunction. This att
speed to slow down, or even make it necessary to restart the computer to get a
normal operation.
Detect IP Spoofing Attack:
Select this option to detect spoof attacks. Hackers disguise themselves as trusted
users of the ne
through the RS-2500 System and invade the network.
Detect Port Scan Attack:
Select this option to detect the port scans hackers use to continuously scan
networks on the Internet to detect computers and vulnerable ports that are opened
by those computers.
Содержание RS-2500
Страница 1: ...User s Manual Dual WAN Security VPN Gateway RS 2500 ...
Страница 218: ...22 Monitor 213 AirLive RS 2500 User s Manual Figure 22 23 To Detect WAN Statistics ...
Страница 220: ...22 Monitor 215 AirLive RS 2500 User s Manual Figure 22 25 To Detect Policy Statistics ...
Страница 224: ...22 Monitor 219 AirLive RS 2500 User s Manual Figure 22 30 Traceroute Results ...