ZyXEL P-794H User Guide - Page 192
Intrusion Detection Configuration, Table 88
![]() |
View all ZyXEL P-794H manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 192 highlights
Chapter 15 Security Table 88 Security Trigger Configuration (continued) LABEL DESCRIPTION Address Translation Type Specify what type of address replacement is to be set on a trigger. You must allow Binary Address Replacement to enable this function. Delete Click this to remove the trigger. New Trigger Click this to create a new trigger. 15.2.4.3 Intrusion Detection Configuration Intrusion Detection Settings (IDS) are network protection features that can be configured to guard against certain Denial of Service and port scanning. Any attempts to attack or scan the network will cause the traffic originating from the attacking machine to be blacklisted for a set time. Click Intrusion Detection Configuration to show the following screen. You can enable the blacklist by selecting true in the Use Blacklist field. Configure the settings for the blacklist and click Apply. Figure 121 Intrusion Detection Configuration Enabling the Blacklist will block traffics from an external host when it has detected one of the following types of attack: PROTOCOL UDP UDP TCP TCP ATTACK NAME Attack Name Ascend Kill WinNuke (Port scan attack) Xmas Tree Scan (Port scan attack) 192 P-794H User's Guide
![](/manual_guide/products/zyxel-p794h-user-guide-bbafe41/192.png)