D-Link DWC-1000 Manuel D’Utilisation
Wireless Controller
User Manual
115
Figure 74 : T he f ollo wing ex ample binds a LAN ho st’ s MAC Address t o a n
IP a ddre ss serve d by DW C-10 00. If there is a n IP/MAC
Bindi ng viola tion, t he violati ng pac ket wi ll be droppe d a nd
logs will be ca pt ured
Bindi ng viola tion, t he violati ng pac ket wi ll be droppe d a nd
logs will be ca pt ured
5.10 Protecting from Internet Attacks
Advanced > Advanced Network > Attack Checks
Attacks can be malicious security breaches or unintentional network issues that
render the controller unusable. Attack checks allow you to manage WAN security
threats such as continual ping requests and discovery via ARP scans . TCP and UDP
flood attack checks can be enabled to manage extreme usage of WAN resources.
render the controller unusable. Attack checks allow you to manage WAN security
threats such as continual ping requests and discovery via ARP scans . TCP and UDP
flood attack checks can be enabled to manage extreme usage of WAN resources.
Additionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks,
if uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.
if uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.