User’s Manual
287
5.19.3.3 Anti-Dos Attack
You can enable SYN Flood Attack Defense and ICMP Flood Attack Defense to defend the device
against Dos attack.
5.19.3.4 Sync Time-Allowlist
The synchronization is only allowed with hosts in the trusted list.
Step 1 Select
Main Menu > SECURITY > Attack Defense > Sync Time-Allowlist.
Step 2 Select Enable to enable Sync Time-Allowlist function.
Step 3 Configure the parameters.
Table 5-77 Allowlist parameters
Add You can add trusted hosts for time synchronization.
Type Select IP address or IP segment for hosts to be added.
IP Address
Input the IP address of a trusted host.
When Type is IP Address, it can be configured
Start Address
Input the start IP address of trusted hosts.
When Type is IP Segment, it can be configured
End Address
Input the end IP address of trusted hosts.
When Type is IP Segment, it can be configured
Step 4 Click Apply to complete the settings.
5.19.4 CA Certificate
You can create or import device certificate and install trusted CA Certificate.
5.19.4.1 Device Certificate
Create Certificate
Select Main Menu > SECURITY > CA Certificate > Device Certificate.