Chapter, Networking and security basics – Linksys RVS4000 User Manual

Page 8

Advertising
background image



Networking and Security Basics

4-Port Gigabit Security Router with VPN

Chapter 

client PCs and servers running various operating systems

including Windows, Linux, and Solaris from network worm

attacks. However, this system does not prevent viruses

contained in email attachments.
The P2P (peer-to-peer) and IM (instant messaging) control

allows the system administrator to prevent network users

from using those protocols to communicate with people

over the Internet. This helps the administrators to set up

company policies on how to use the Internet bandwidth

wisely.
The signature file is the heart of the IPS system. It is similar

to the Virus definition file on your PC’s Anti-Virus software.

IPS uses this file to match against packets coming into the

Router and performs actions accordingly. The RVS4000 is

shipped with a signature file containing 1000+ rules, which

cover the following categories: DDoS, Buffer Overflow,

Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus,

Worm, and Web Attacks.
Customers are encouraged to update their IPS signature

file regularly to prevent any new types of attacks on the

Internet.

IPS Scenarios

Advertising