Figure 163 Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in
network security requirements are as follows:
Router always drops packets from Host D, an attacker.
•
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
•
•
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Router provides Land attack protection and Smurf attack protection.
•
Figure
164, internal users Host A, Host B, and Host C access the Internet through Router. The
164