Intrusion Detection; Administration > Intrusion Detection - Multitech MultiAccess MA30120 User Manual

Communications server
Hide thumbs Also See for MultiAccess MA30120:
Table of Contents

Advertisement

Administration
The Intrusion Detection mechanism is used to notify the administrator if there has been any tampering with the
files on the server.

Intrusion Detection

Enable File Integrity Check
Check the box to enable File Integrity Checking. Select the amount of time you would like the system to
conduct this check. Options are every 5 Minutes, Hourly, or Daily. Then click the Save button.
Network Intrusion Detection
Enable Network Intrusion Detection
This allows the user to detect attacks on the network. In the event that a port scan is carried out by hackers
who are looking for the weak spots in a secure network. This feature informs the administrator by email as
soon as the attack has been logged. The administrator can decide what actions are to be taken. By default,
DOS attack, minimum fragmentation checks, port scans, DNS attacks, bad packets, overflows, chat
accesses, Web attacks will be detected; and then the administrator is informed. Apart from the above, the
user can configure user defined rules for intrusion detection.
Check the box to enable Network Intrusion Detection. Then click the Save button.
User Defined Network Intrusion Detection Rules
SRC IP Address
This selection allows you to choose the network from which the information packet must be sent for the rule
to match. Network groups can also be selected. The ANY option matches all IP addresses, regardless of
the whether they are officially assigned addresses or private addresses. These Networks or groups must
be predefined in the Networks menu.
Destination IP Address
This selection allows you to choose the network to which the information packet must be sent for the rule to
match. Network groups can also be selected. These network clients or groups must have been previously
defined in the Networks menu.
MultiAccess Communications Server MA30120 User Guide
> Intrusion Detection
Chapter 3 – Software
Administration > Intruder Detection
45

Advertisement

Table of Contents
loading

Table of Contents