TP-LINK 24-Port 10/100Mbps + 4-Port Gigabit L2 Fully Managed Switch TL-SL5428E 데이터 시트

제품 코드
TL-SL5428E
다운로드
페이지 303
 
Defend Type: 
Displays the Defend Type name. 
Attack Count: 
Displays the count of the corresponding attack. 
12.4.2  DoS Detect 
DoS Detect functions to detect the details of the DoS attack packets, based on which you can 
quickly locate the attacker in the local network. 
Choose the menu Network Security→DoS Defend→DoS Detect to load the following page. 
 
Figure 12-18 DoS Detect 
The following entries are displayed on this screen:
 
 
Detect Config 
Detect Time: 
Specify the detect time for each DoS attack type except the 
flooding attack type. 
Detect: 
Click the Detect button to start the detection. The switch will 
detect each type of the DoS attack in turn. 
 
Detect Result 
Port: 
Display the port number. 
Attack Type: 
Displays the Attack Type name. 
Attack Count: 
Displays the count of the attack. 
Tips: 
You are suggested to take the following further steps to ensure the network security. 
1.  It’s recommended to inspect and repair the system vulnerability regularly. It is also necessary 
to install the system bulletins and backup the important information in time. 
2.  The network administrator is suggested to inspect the physic environment of the network and 
block the unnecessary network services. 
3.  Enhance the network security via the protection devices, such as the hardware firewall.   
12.5 802.1X 
The 802.1X protocol was developed by IEEE802 LAN/WAN committee to deal with the security 
issues of wireless LANs. It was then used in Ethernet as a common access control mechanism for 
LAN ports to solve mainly authentication and security problems. 
802.1X is a port-based network access control protocol. It authenticates and controls devices 
requesting for access in terms of the ports of LAN access control devices. With the 802.1X 
209