D-Link DWC-1000 User Manual - Page 223

Protecting from Internet Attacks

Page 223 highlights

Wireless Controller User Manual p o rt is co n n ect ed is les s t h an wh en all o f t h e av ailab le LA N p o rt s h a v e an act iv e Et h ern et co n n ect io n . Leng th Detecti on S tate: W h en en ab led t h e LA N co n t ro ller will red u ce t h e o v erall cu rren t s u pplied t o t he LA N p o rt wh en a s mall cab le len g t h is co nn ected t o t h at p o rt . Lo n g er cab les h ave h ig her resis tance t h an s h o rt er ca b les an d req u ire mo re p o wer t o t ran s mit p acket s o ver t h at d ist an ce. Th is o p t io n will red u ce t h e p o wer t o a LA N p o rt if an Et h ern et cab le o f les s t h an 10 ft is d et ect ed as b ein g co n n ect ed t o t h at p o rt . J umbo Frames Opti on: W h en en ab led , LA N s id e d ev ices can exch an g e t raffic co n t an in g ju mb o frames . 7.14 Protecting from Internet Attacks Advanced > Advanced Network > Attack Checks A t t acks can b e malicio u s s ecu rit y b reach es o r u n in t en t io n al n et wo rk is s u es t h at ren d er t h e co n troller u n u sab le. A tt ack ch ecks allo w y o u t o man ag e Op t io n s ecu rit y threats s uch as continual ping requests and dis covery via A RP s cans . TCP and UDP flo o d at t ack ch ecks can b e en ab led t o man ag e ext reme u s ag e o f Op t io n res o u rces . A dditionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks , if uninhibited, can us e up proces s ing power and bandwidth and prevent regular n et wo rk s erv ices fro m ru n n in g n o rmally . ICM P p acket flo o d in g , SYN t raffic flo o d in g , an d Ech o s torm t h res ho lds can b e con fig ured t o t emp orarily s usp ect t raffic from the offending s ource. 221

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324

Wireless Controller
User Manual
221
port is connected is less than when all of the available LAN ports have an active
Ethernet connection.
Length Detection State:
When enabled the LAN controller will reduce the overall
current supplied to the LAN port when a small cable length is connected to that port.
Longer cables have higher resistance than shorter cables and require more power to
transmit packets over that distance. This option will reduce the power to a LAN port
if an Ethernet cable of less than 10 ft is detected as being connected to that port.
Jumbo Frames Option:
When enabled, LAN side devices can exchange traffic
contaning jumbo frames.
7.14 Protecting from Internet Attacks
Advanced > Advanced Network > Attack Checks
Attacks can be malicious security breaches or unintentional network issues that
render the controller unusable. Attack checks allow you to manage Option security
threats such as continual ping requests and discovery via ARP scans. TCP and UDP
flood attack checks can be enabled to manage extreme usage of Option resources.
Additionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks,
if uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.