beautypg.com

AirLive RS-2500 User Manual

Page 192

background image

21. Anomaly Flow IP

187

AirLive RS-2500 User’s Manual

ing IP Address continuously.

sting, your network is experiencing an

determine it as an attack.

r Source IP) Seconds】: When

RS-2500 determines as being attacked, it will block the attacking source IP in

you set. After blocking for certain seconds, the device will

continuously.

ack can cause network

twork in Spoof attacks. They use a fake identity to try to pass

source IP Address. And if the max number still exceed the define value, it will

block the attack

Detect UDP Flood:

When Hackers continuously send PING packets to all the machines of the LAN

networks or to the RS-2500 via broadca

UDP attack.

【UDP Flood Threshold (Total) Pkts/Sec】: The System Administrator can

enter the maximum number of UDP packets per second that is allow to enter

the network/RS-2500. If the value exceeds the setting one, and then the

device will

【 UDP Flood Threshold (Per Source IP) Pkts/Sec 】 : The System

Administrator can enter the maximum number of UDP packets per second

from attacking source IP Address that is allow to enter the network/RS-2500.

If the value exceeds the setting one, and then the device will determine it as

an attack.

【UDP Flood Threshold Blocking Time (Pe

the blocking time

start to calculate the max number of UPD packets from attacking source IP. If

the max number still exceed the define value, it will block the attacking IP

Address

Detect Ping of Death Attack:

Select this option to detect the attacks of tremendous trash data in PING packets

that hackers send to cause System malfunction. This att

speed to slow down, or even make it necessary to restart the computer to get a

normal operation.

Detect IP Spoofing Attack:

Select this option to detect spoof attacks. Hackers disguise themselves as trusted

users of the ne

through the RS-2500 System and invade the network.

Detect Port Scan Attack:

Select this option to detect the port scans hackers use to continuously scan

networks on the Internet to detect computers and vulnerable ports that are opened

by those computers.