Barricade g Wireless Router with USB Print Server
Manual
8.6.5 | Intrusion Detection
The Barricade g inspects packets at the application layer, and maintains TCP and UDP session
information, including timeouts and the number of active sessions. The Barricade g also provides
the ability to detect and prevent certain types of network attacks such as DoS attacks. Network
attacks that deny access to a network device are called denial-of-service (DoS) attacks. Denials of
Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. The
goal is not to steal information, but to disable a device or network so users no longer have access
to network resources.
By using inspected information and timeout/threshold criteria, the Barricade g provides following
DOS attacks prevention: Ping of Death (Ping flood) attack, SYN flood attack, IP fragment attack
(Teardrop Attact) , Brute-force attack, Land Attack, IP Spoofing attack, IP with zero length, TCP
null scan (Port Scan Attach), UDP port loopback, Snork Attack etc.
SPI and Anti-DoS firewall protection
: Enable/Disable the SPI functions of firewall.
RIP Defect
: Enable/Disable the RIP Defect function of firewall.
Discard Ping to WAN
:
When this feature is enabled, any host on the WAN cannot ping this product.
This helps avoid unnecessary attacks from the WAN side because your connection is invisible. It is
recommended that you enable this option for security.
Stateful Packet Inspection (SPI):
Use this option to define the type of data you want the SPI
firewall to scan.
38
Downloaded from
www.Manualslib.com
manuals search engine