Check Point UTM-1 Edge User Manual page 422

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

SmartDefense Categories
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to
an attack. This is most commonly done by attempting to access a port and waiting for a
response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
Host Port Scan. The attacker scans a specific host's ports to determine which of
the ports are open.
Sweep Scan. The attacker scans various hosts to determine where a specific port
is open.
You can configure how the UTM-1 appliance should react when a port scan is detected.
408
Check Point UTM-1 Edge User Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Table of Contents

Save PDF