EasyManua.ls Logo

Check Point UTM-1 Edge - Page 422

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SmartDefense Categories
408 Check Point UTM-1 Edge User Guide
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to
an attack. This is most commonly done by attempting to access a port and waiting for a
response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
Host Port Scan. The attacker scans a specific host's ports to determine which of
the ports are open.
Sweep Scan. The attacker scans various hosts to determine where a specific port
is open.
You can configure how the UTM-1 appliance should react when a port scan is detected.

Table of Contents

Related product manuals