Planet Technology MH-2001 User Manual
Page 260
MH-2001 Multi-Homing Security Gateway User’s Manual
Detect ICMP Flood
Can detect the data packets sent from hacker and use the Broadcast to send to ever internal PC.
ICMP Flood Threshold : Define all the IP and the total ICMP packets(Pkts/Sec) pass through the
MH-2001. If over the setting value, then MH-2001 will define it to be attacked.
ICMP Flood Threshold (Per Source IP ):Define every source IP and the total ICMP packets
(Pkts/Sec) pass through the MH-2001. If over the setting value, then MH-2001 will define it to be
attacked.
ICMP Flood Threshold Blocking Time ( Per Source IP ):The MH-2001 will block the packets
from the attack source IP according to the time setting. After the blocking time, the MH-2001 will
re-calculate the total ICMP flow from every source IP, if over the setting value, then MH-2001 will
keep blocking.
Detect UDP Flood
Can detect the UDP data packets sent from hacker and use the Broadcast to send to ever internal PC.
UDP Flood Threshold (Total): Define all the IP and the total UDP packets(Pkts/Sec) pass
through the MH-2001. If over the setting value, then MH-2001 will define it to be attacked.
UDP Flood Threshold (Per Source IP ): Define every source IP and the total UDP packets
(Pkts/Sec) pass through the MH-2001. If over the setting value, then MH-2001 will define it to be
attacked.
Udp Flood Threshold Blocking Time ( Per Source IP ): The MH-2001 will block the packets
from the attack source IP according to the time setting. After the blocking time, the MH-2001 will
re-calculate the total UDP flow from every source IP, if over the setting value, then MH-2001 will
keep blocking.
Detect Ping of Death Attack
Can detect the status of PING data packets sent from the hackers, in order to paralyze the network.
Detect IP Spoofing Attack
Can detect the hackers which prevent the illegal user to pass through the MH-2001.
Detect Port Scan Attack
Can detect the Port ID which the hacker use it to detect the port and attack them.
Detect Tear Drop Attack
Can detect the IP data packets which pretend the normal data packets, but actually this kind of packets
contain the mount of data packets, which can let the system crash, hold on or reboot.
- 254 -