Protecting From Internet Attacks - D-Link DWC-1000 User Manual

Wireless controller
Hide thumbs Also See for DWC-1000:
Table of Contents

Advertisement

Wireless Controller
Figure 74: The following example binds a LAN host's MAC Address to an
IP address served by DWC-1000. If there is an IP/MAC
Binding violation, the violating packet will be dropped and
logs will be captured

5.10 Protecting from Internet Attacks

Advanced > Advanced Network > Attack Checks
Attacks can be malicious security breaches or unintentional network issues that
render the controller unusable. Attack checks allow you to manage WAN security
threats such as continual ping requests and discovery via ARP scans . TCP and UDP
flood attack checks can be enabled to manage extreme usage of WAN resources.
Additionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks,
if uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect traffic
from the offending source.
115
User Manual

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents