TP-Link OC200 Omada Controller Software 4.1.5Windows/Linux User Guide - Page 100
Attack Defense
View all TP-Link OC200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 100 highlights
Chapter 4 URLs Configure the Network with Omada SDN Controller Enter the URL address using up to 128 characters. URL address should be given in a valid format. The URL which contains a wildcard(*) is supported. One URL with a wildcard(*) can match mutiple subdomains. For example, with *.tp-link.com specified, community.tp-link.com will be matched. 4. 5. 3 Attack Defense Overview Attacks initiated by utilizing inherent bugs of communication protocols or improper network deployment have negative impacts on networks. In particular, attacks on a network device can cause the device or network paralysis. With the Attack Defense feature, the gateway can identify and discard various attack packets in the network, and limit the packet receiving rate. In this way, the gateway can protect itself and the connected network against malicious attacks. The gateway provides two types of Attack Defense: ■■ Flood Defense If an attacker sends a large number of fake packets to a target device, the target device is busy with these fake packets and cannot process normal services. Flood Defense detects flood packets in real time and limits the receiving rate of the packets to protect the device. Flood attacks include TCP SYN flood attacks, UDP flood attacks, and ICMP flood attacks. ■■ Packet Anomaly Defense Anomalous packets are packets that do not conform to standards or contain errors that make them unsuitable for processing. Packet Anomaly Defense discards the illegal packets directly. 98