DSL-1500G++ User Manual
-
62
-
blocks suspicious hosts for once a DOS attack attempt has been detected.
d.
Scan Attack Block Duration; type the length of time (in seconds) that the Firewall
blocks suspicious hosts for after it has detected scan activity.
e.
Victim Protection Block Duration; type the length of time (in seconds) that the Firewall
blocks packets destined for the victim of a spoofing style attack.
f.
Maximum TCP Open Handshaking Count; type in the maximum number of unfinished
TCP handshaking sessions (per second) that are allowed by Firewall before a SYN
Flood is detected.
g.
Maximum Ping Count; type in the maximum number of pings (per second) that are
allowed before the Firewall detects an Echo Storm DOS attack.
h.
Maximum ICMP Count; type in the maximum number of ICMP packets (per second)
that are allowed by the Firewall before an ICMP Flood DOS is detected.
3.
Once you have configured Intrusion Detection, click on
. The Intrusion Detection
settings are applied to the Firewall, and the Security Interface Configuration page is
displayed.
3.2.4.13 Ports
This option allows you to configure the ports available on your Router, depending on the
type of image that you are booting.
Configuring ports
1.
From the left-hand menu, click on
Configuration
. From the
Configuration
menu, click on
Ports
. A sub-list of ports available on your device is displayed.
2. From
the
Ports
menu, click on
Shdsl
. The
Shdsl Port Configuration
page is displayed: