Cisco Cisco Firepower 4120 Security Appliance
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Table 42: Advanced Parameters for the Device Users
Parameter
Description
Authentication Mode
The method for of authenticating a user’s access to the device. Values:
•
Local User Table—The device uses the User Table to authenticate access.
•
RADIUS and Local User Table—The device uses the RADIUS servers to
authenticate access. If the request to the RADIUS server times out, the
device uses the User Table to authenticate access.
Default: Local User Table
Configuring the DefensePro Security-Security
Setup
Before you configure a Network Protection policy and its protection profiles, you must enable the protection
features you want to use and configure the global parameters for the protection features.
This section contains the following topics:
This section contains the following topics:
•
•
•
•
•
•
Note:
After a protection feature is enabled on a device, the device requires a reboot. However, you need to reboot
only once after enabling features within the same navigation branch.
Configuring DoS Shield Protection
The DoS Shield mechanism protects against known flood attacks and flood-attack tools that cause a denial-of-
service effect, making computer resources unavailable to the intended users.
Notes
•
DoS Shield protection is enabled by default.
•
This feature is also supported on management interfaces. DoS
Shield profiles prevent the following:
•
Known TCP, UDP, and ICMP floods
•
Known attack tools available in the Internet
•
Known floods created by bots, which are automated attacks
DoS Shield protection uses signatures from the Radware Signatures database. This database is continuously
updated and protects against all known threats.
© 2016 Cisco | Radware. All rights reserved. This document is Cisco Public.
Page 89 of 281