SmartDefense Categories
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to
an attack. This is most commonly done by attempting to access a port and waiting for a
response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
•
Host Port Scan. The attacker scans a specific host's ports to determine which of
the ports are open.
•
Sweep Scan. The attacker scans various hosts to determine where a specific port
is open.
You can configure how the UTM-1 appliance should react when a port scan is detected.
408
Check Point UTM-1 Edge User Guide
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?