Avira Premium Security Suite
94
TCP port scan
With this rule, you can define when a TCP port scan is assumed by the FireWall and what
should be done in this case. This rule serves for preventing so-called TCP port scan
attacks that result in a detection of open TCP ports on your computer. This kind of
attack is used to search a computer for weak spots and is often followed by more
dangerous attack types.
Predefined rules for the TCP port scan
Setting: Low
Setting: Medium
Setting: High
Assume a TCP port scan if
50
or more ports were
scanned in
5,000
milliseconds.
When detected,
log
attacker's IP and
don't
add
rule to block the
attack.
Assume a TCP port scan if
50
or more ports were
scanned in
5,000
milliseconds.
When detected,
log
attacker's IP and
add
rule
to block the attack.
Same rule as for medium
level.
Ports
With a mouse click on the link a dialog box appears in which you can enter the number of
ports that must have been scanned so that a TCP port scan is assumed.
Port scan time window
With a mouse click on this link a dialog box appears in which you can enter the time span
for a certain number of port scans, so that a TCP port scan is assumed.
Report file
With a mouse click on the link you have the choice to log or not to log the attacker's IP
address.
Rule
With a mouse click on the link you have the choice to add or not to add the rule to block
the TCP port scan attack.
UDP port scan
With this rule, you can define when a UDP port scan is assumed by the FireWall and
what should be done in this case. This rule prevents so-called UDP port scan attacks that
result in a detection of open UDP ports on your computer. This kind of attack is used to
search a computer for weak spots and is often followed by more dangerous attack types.
Predefined rules for the UDP port scan
Setting: Low
Setting: Medium
Setting: High
Assume a UDP port scan
if
50
or more ports were
scanned in
5,000
milliseconds.
When detected,
log
attacker's IP and
don't
Assume a UDP port scan
if
50
or more ports were
scanned in
5,000
milliseconds.
When detected,
log
attacker's IP and
add
rule
Same rule as for medium
level.
Содержание PREMIUM SECURITY SUITE
Страница 1: ...Avira Premium Security Suite User Manual...
Страница 45: ...Avira Premium Security Suite 40 Start job Stop job...
Страница 46: ...41...