Smc-networks SMCWBR14-G2 Uživatelský manuál Strana 82

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 132
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 81
C
ONFIGURING THE
B
ARRICADE
4-36
Network attacks that deny access to a network device are called DoS
attacks. DoS attacks are aimed at devices and networks with a connection
to the Internet. Their goal is not to steal information, but to disable a
device or network so users no longer have access to network resources.
The Barricade protects against DoS attacks including: Ping of Death (Ping
flood) attack, SYN flood attack, IP fragment attack (Teardrop Attack),
Brute-force attack, Land Attack, IP Spoofing attack, IP with zero length,
TCP null scan (Port Scan Attack), UDP port loopback, Snork Attack.
Note: The firewall does not significantly affect system performance, so
we advise enabling the prevention features to protect your
network.
Zobrazit stránku 81
1 2 ... 77 78 79 80 81 82 83 84 85 86 87 ... 131 132

Komentáře k této Příručce

Žádné komentáře