EasyManua.ls Logo

TP-Link JetStream L2 Lite TL-SG3210 - Page 162

TP-Link JetStream L2 Lite TL-SG3210
231 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SYN-ACK packets. Since the IP address is fake, no response will be
returned. The Server will keep on sending SYN-ACK packets. If the attacker
sends overflowing fake request packets, the network resource will be
occupied maliciously and the requests of the legal clients will be denied.
Table 11-1 Defendable DoS Attack Types
On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu Network SecurityDoS DefendDoS Defend to load the following page.
Figure 11-16 DoS Defend
The following entries are displayed on this screen:
¾ Configure
DoS Defend: Enable/Disable DoS Defend function.
¾ Defend Table
Select: Select the entry to enable the corresponding Defend Type.
Defend Type: Displays the Defend Type name.
Tips:
You are suggested to take the following further steps to ensure the network security.
1. It’s recommended to inspect and repair the system vulnerability regularly. It is also necessary
to install the system bulletins and backup the important information in time.
2. The network administrator is suggested to inspect the physic environment of the network and
block the unnecessary network services.
3. Enhance the network security via the protection devices, such as the hardware firewall.
155

Table of Contents

Other manuals for TP-Link JetStream L2 Lite TL-SG3210

Related product manuals