Planet Technology MH-2001 User Manual

Page 260

Advertising
background image

MH-2001 Multi-Homing Security Gateway User’s Manual

Detect ICMP Flood

„

Can detect the data packets sent from hacker and use the Broadcast to send to ever internal PC.

‹

ICMP Flood Threshold : Define all the IP and the total ICMP packets(Pkts/Sec) pass through the

MH-2001. If over the setting value, then MH-2001 will define it to be attacked.

‹

ICMP Flood Threshold (Per Source IP ):Define every source IP and the total ICMP packets

(Pkts/Sec) pass through the MH-2001. If over the setting value, then MH-2001 will define it to be

attacked.

‹

ICMP Flood Threshold Blocking Time ( Per Source IP ):The MH-2001 will block the packets

from the attack source IP according to the time setting. After the blocking time, the MH-2001 will

re-calculate the total ICMP flow from every source IP, if over the setting value, then MH-2001 will

keep blocking.

Detect UDP Flood

„

Can detect the UDP data packets sent from hacker and use the Broadcast to send to ever internal PC.

‹

UDP Flood Threshold (Total): Define all the IP and the total UDP packets(Pkts/Sec) pass

through the MH-2001. If over the setting value, then MH-2001 will define it to be attacked.

‹

UDP Flood Threshold (Per Source IP ): Define every source IP and the total UDP packets

(Pkts/Sec) pass through the MH-2001. If over the setting value, then MH-2001 will define it to be

attacked.

‹

Udp Flood Threshold Blocking Time ( Per Source IP ): The MH-2001 will block the packets

from the attack source IP according to the time setting. After the blocking time, the MH-2001 will

re-calculate the total UDP flow from every source IP, if over the setting value, then MH-2001 will

keep blocking.

Detect Ping of Death Attack

„

Can detect the status of PING data packets sent from the hackers, in order to paralyze the network.

Detect IP Spoofing Attack

„

Can detect the hackers which prevent the illegal user to pass through the MH-2001.

Detect Port Scan Attack

„

Can detect the Port ID which the hacker use it to detect the port and attack them.

Detect Tear Drop Attack

„

Can detect the IP data packets which pretend the normal data packets, but actually this kind of packets

contain the mount of data packets, which can let the system crash, hold on or reboot.

- 254 -

Advertising