D-Link DSR-250v2 Product Manual - Page 71

Attack Check

Page 71 highlights

Intrusion prevention LAN and WAN DMZ and WAN Number of signatures loaded Enable or disable intrusion prevention. IPS/IDS checks active between Enable it to detect intrusions between LAN and WAN interfaces. Enable it to detect intrusions between DMZ and WAN interfaces. IPS status It displays the number of signatures loaded. Attack Check Attacks can be malicious security breaches or unintentional network issues that render the router unusable. Attack checks allow you to manage WAN security threats, such as continual ping requests and discovery via ARP scans. You can enable TCP and UDP flood attack checks to manage extreme usage of WAN resources. Additionally, you can block certain Denial-of-Service (DoS) attacks. These attacks, if uninhibited, can use up processing power and bandwidth and can prevent normal regular network services. You can also configure ICMP packet flooding, SYN traffic flooding, and Echo storm thresholds to suspect traffic from the offending source temporarily. The fields available on this page are as follows: Field Stealth mode WAN security checks Description

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

Intrusion prevention
Enable or disable intrusion prevention.
IPS/IDS checks active between
LAN and WAN
Enable it to detect intrusions between LAN and WAN interfaces.
DMZ and WAN
Enable it to detect intrusions between DMZ and WAN interfaces.
IPS status
Number of signatures loaded
It displays the number of signatures loaded.
Attack Check
Attacks can be malicious security breaches or unintentional network issues that render the router unusable. Attack checks allow you to manage
WAN security threats, such as continual ping requests and discovery via ARP scans. You can enable TCP and UDP flood attack checks to
manage extreme usage of WAN resources.
Additionally, you can block certain Denial-of-Service (DoS) attacks. These attacks, if uninhibited, can use up processing power and bandwidth
and can prevent normal regular network services. You can also configure ICMP packet flooding, SYN traffic flooding, and Echo storm thresholds
to suspect traffic from the offending source temporarily.
The fields available on this page are as follows:
Field
Description
WAN security checks
Stealth mode