Справочник Пользователя для D-Link DSR-1000
Unified Services Router
User Manual
86
Figure 51 : Intr usi on Preventio n f eature s on the router
5.11 Protecting from Internet Attacks
Advanced > Advanced Network > Attack Checks
Attacks can be malicious security breaches or unintentional network issues that
render the router unusable. Attack checks allow you to manage WAN security
threats such as continual p ing requests and discovery via ARP scans. TCP and UDP
flood attack checks can be enabled to manage extreme usage of WAN resources.
render the router unusable. Attack checks allow you to manage WAN security
threats such as continual p ing requests and discovery via ARP scans. TCP and UDP
flood attack checks can be enabled to manage extreme usage of WAN resources.
Additionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks,
if uninhibited, can use up processing po wer and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.
if uninhibited, can use up processing po wer and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.