TP-Link 13dBi CPE510 V1 UG - Page 54

IPSec Passthrough, Blocked DoS Host List, Packets Statistics Interval, ICMP_FLOOD Attack Filter

Page 54 highlights

DoS Protection Chapter 5 Network Tab  IPSec Passthrough - IPSec (Internet Protocol security) is a suite of protocols for ensuring private, secure communications over IP (Internet Protocol) networks, through the use of cryptographic security services. Check the box to allow IPSec tunnels to pass through the Device. DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously by the network attackers or the evil programs sending a lot of service requests to the Host, which incurs an abnormal service or even breakdown of the network. With DoS Protection function enabled, the device can analyze the specific fields of the IP packets and distinguish the malicious DoS attack packets. Upon detecting the packets, the device will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network. The hosts sending these packets will be added into the Blocked DoS Host List. The device can defend a few types of DoS attack such as ICMP_FLOOD, UDP_FLOOD and TCP_SYN_FLOOD.  Packets Statistics Interval - Select a value between 5 and 60 seconds from the drop-down list. The default value is 10. The value indicates the time interval of the packets statistics. The result of the statistic is used for analysis by ICMP-Flood, UDP Flood and TCP-SYN Flood.  ICMP_FLOOD Attack Filter - Enter a value between 5 and 3600. The default value is 50. When the current ICMP-FLOOD Packets number is beyond the set value, the device will start up the blocking function immediately.  UDP_FLOOD Attack Filter - Enter a value between 5 and 3600. The default value is 500. When the current UPD-FLOOD Packets number is beyond the set value, the device will start up the blocking function immediately.  TCP-SYN-FLOOD Attack Filter - Enter a value between 5 and 3600. The default value is 50. When the current TCP-SYN-FLOOD Packets numbers is beyond the set value, the Device will start up the blocking function immediately. - 51 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

Chapter 5 Network Tab
IPSec Passthrough
- IPSec (Internet Protocol security) is a suite of
protocols for ensuring private, secure communications over IP (Internet
Protocol) networks, through the use of cryptographic security services.
Check the box to allow IPSec tunnels to pass through the Device.
DoS Protection
DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously
by the network attackers or the evil programs sending a lot of service requests
to the Host, which incurs an abnormal service or even breakdown of the
network.
With DoS Protection function enabled, the device can analyze the
specific fields of the IP packets and distinguish the malicious DoS attack
packets. Upon detecting the packets, the device will discard the illegal packets
directly and limit the transmission rate of the legal packets if the over legal
packets may incur a breakdown of the network. The hosts sending these
packets will be added into the
Blocked DoS Host List
. The device can defend a
few
types
of
DoS
attack
such
as
ICMP_FLOOD,
UDP_FLOOD
and
TCP_SYN_FLOOD.
Packets Statistics Interval
- Select a value between 5 and 60 seconds from
the drop-down list. The default value is 10. The value indicates the time
interval of the packets statistics. The result of the statistic is used for
analysis by ICMP-Flood, UDP Flood and TCP-SYN Flood.
ICMP_FLOOD Attack Filter
- Enter a value between 5 and 3600. The
default value is 50. When the current ICMP-FLOOD Packets number is
beyond the set value, the device will start up the blocking function
immediately.
UDP_FLOOD Attack Filter
- Enter a value between 5 and 3600. The default
value is 500. When the current UPD-FLOOD Packets number is beyond the
set value, the device will start up the blocking function immediately.
TCP-SYN-FLOOD Attack Filter
- Enter a value between 5 and 3600. The
default value is 50. When the current TCP-SYN-FLOOD Packets numbers is
beyond the set value, the Device will start up the blocking function
immediately.
- 51 -