D-Link DSR-250v2 Product Manual - Page 71
Attack Check
![]() |
View all D-Link DSR-250v2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 71 highlights
Intrusion prevention LAN and WAN DMZ and WAN Number of signatures loaded Enable or disable intrusion prevention. IPS/IDS checks active between Enable it to detect intrusions between LAN and WAN interfaces. Enable it to detect intrusions between DMZ and WAN interfaces. IPS status It displays the number of signatures loaded. Attack Check Attacks can be malicious security breaches or unintentional network issues that render the router unusable. Attack checks allow you to manage WAN security threats, such as continual ping requests and discovery via ARP scans. You can enable TCP and UDP flood attack checks to manage extreme usage of WAN resources. Additionally, you can block certain Denial-of-Service (DoS) attacks. These attacks, if uninhibited, can use up processing power and bandwidth and can prevent normal regular network services. You can also configure ICMP packet flooding, SYN traffic flooding, and Echo storm thresholds to suspect traffic from the offending source temporarily. The fields available on this page are as follows: Field Stealth mode WAN security checks Description
![](/manual_guide/products/dlink-dsr250v2-product-manual-17a0a81/71.png)