Charles 3641-80 User Manual page 93

Ethernet routers
Hide thumbs Also See for 3641-80:
Table of Contents

Advertisement

I s s u e 1 . 0 , A p r i l 2 0 0 6
Victim Protection Block Duration; type the length of time (in seconds) that the Firewall blocks
packets destined for the victim of a spoofing style attack.
Maximum TCP Open Handshaking Count; type in the maximum number of unfinished TCP
handshaking sessions (per second) that are allowed by Firewall before a SYN Flood is detected.
Maximum Ping Count; type in the maximum number of pings (per second) that are allowed
before the Firewall detects an Echo Storm DOS attack.
Maximum ICMP Count; type in the maximum number of ICMP packets (per second) that are
allowed by the Firewall before an ICMP Flood DOS is detected.
3. Once you have configured Intrusion Detection, click on Apply. The Intrusion Detection settings
are applied to the Firewall, and the Security Interface Configuration page is displayed.
These actions have the same effect as typing the following CLI commands:
security enable
firewall enable IDS
firewall set IDS blacklist
firewall set IDS victimprotection
firewall set IDS DOSattackblock
firewall set IDS SCANattackblock
firewall set IDS MaxTCPopenhandshake
firewall set IDS MaxPING
firewall set IDS MaxICMP
firewall set IDS blacklist clear
©2006 Charles Industries, Ltd.
All rights reserved. Printed in United States of America.
The availability of features and technical specifications herein subject to change without notice.
85
Section 364-180-N02

Advertisement

Table of Contents
loading

This manual is also suitable for:

3648-80

Table of Contents