TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 78
Flood Defense
![]() |
View all TP-Link TL-ER6020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 78 highlights
Figure 3-49 Attack Defense The following items are displayed on this screen: General Flood Defense: Flood attack is a commonly used DoS (Denial of Service) attack, including TCP SYN, UDP, ICMP and so on. It is recommended to select all the Flood Defense options and specify the corresponding thresholds. Keep the default settings if you are not sure. -73-
![](/manual_guide/products/tplink-tler6020-tler6020-v1-user-guide-1fe5db5/78.png)
-73-
Figure 3-49
Attack Defense
The following items are displayed on this screen:
General
Flood Defense:
Flood attack is a commonly used DoS (Denial of Service) attack,
including TCP SYN, UDP, ICMP and so on. It is recommended to
select
all
the
Flood
Defense
options
and
specify
the
corresponding thresholds. Keep the default settings if you are not
sure.