IEF-G9010 Series User Manual
64
9.
The Security Screens
This chapter describes the cybersecurity and policy enforcement features.
Cybersecurity
This device features cybersecurity mechanisms, which cover both intrusion prevention and denial of service
(Dos) attack prevention. The signature rules of intrusion prevention are called DPI (Deep Packet Inspection)
patterns. These patterns can be regularly updated through SDC or by manually importing new patterns via
the device’s web management UI.
Configuring Cybersecurity – Denial of Service Prevention
Steps:
1.
Go to [Security] > [Cyber Security].
The [Denial of Service Prevention] screen will appear.
2.
Use the toggle to enable or disable the Denial of Service prevention feature.
3.
Select the default action if the feature is enabled:
a.
Monitoring and Log
: The IEF-G9010 device will actively monitor and log DoS attacks but will not
act.
b.
Prevention and Log
: The IEF-G9010 device will detect, block, and log DoS attacks.
4.
Check the DoS prevention rules to enable.
5.
(Optional) Configure the threshold values of the enabled DoS service rules.
6.
Click
Save
.
NOTE
Flood/Scan Attack Protection rules utilize the detection period and threshold mechanisms to detect an
attack. During a detection period (typically every 5 seconds), if the number of anomalous packets reaches
the specified threshold, an attack detection occurs. If the rule action is set to
Prevention and Log
, the
security node blocks subsequent anomalous packets until the end of the detection period. After the
detection period, the security node will continue to allow anomalous packets to go through until the
threshold is reached again.
Содержание IEF-G9010 Series
Страница 78: ...IEF G9010 Series User Manual 78...