Cisco RVS4000 - Gigabit Security Router User Manual page 10

4-port gigabit security router with vpn business series
Hide thumbs Also See for RVS4000 - Gigabit Security Router:
Table of Contents

Advertisement

Networking and Security Basics
Chapter 2
client PCs and servers running various operating systems
including Windows, Linux, and Solaris from network worm
attacks. However, this system does not prevent viruses
contained in email attachments.
The P2P (peer-to-peer) and IM (instant messaging) control
allows the system administrator to prevent network users
from using those protocols to communicate with people
over the Internet. This helps the administrators to set up
company policies on how to use the Internet bandwidth
wisely.
The signature file is the heart of the IPS system. It is similar
to the Virus definition file on your PC's Anti-Virus software.
IPS uses this file to match against packets coming into the
Router and performs actions accordingly. The RVS4000 is
shipped with a signature file containing 1000+ rules, which
cover the following categories: DDoS, Buffer Overflow,
Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus,
Worm, and Web Attacks.
Customers are encouraged to update their IPS signature
file regularly to prevent any new types of attacks on the
Internet.
IPS Scenarios
3
4-Port Gigabit Security Router with VPN

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RVS4000 - Gigabit Security Router and is the answer not in the manual?

This manual is also suitable for:

Linksys rvs4000

Table of Contents