Tp-Link TL-SG3424P [173/259] Choose the menu network security dos defend dos defend to load the following page
![Tp-Link TL-SG3424P [173/259] Choose the menu network security dos defend dos defend to load the following page](/views2/1042078/page173/bgad.png)
With DoS Defend function enabled, the switch can analyze the specific fields of the IP packets and
distinguish the malicious DoS attack packets. Upon detecting the packets, the switch will discard
the illegal packets directly and limit the transmission rate of the legal packets if the over legal
packets may incur a breakdown of the network. The switch can defend a few types of DoS attack
listed in the following table.
DoS Attack Type Description
Land Attack The attacker sends a specific fake SYN packet to the destination Host.
Since both the source IP address and the destination IP address of the SYN
packet are set to be the IP address of the Host, the Host will be trapped in
an endless circle for building the initial connection. The performance of the
network will be reduced extremely.
Scan SYNFIN The attacker sends the packet with its SYN field and the FIN field set to 1.
The SYN field is used to request initial connection whereas the FIN field is
used to request disconnection. Therefore, the packet of this type is illegal.
The switch can defend this type of illegal packet.
Xmascan The attacker sends the illegal packet with its TCP index, FIN, URG and
PSH field set to 1.
NULL Scan Attack The attacker sends the illegal packet with its TCP index and all the control
fields set to 0. During the TCP connection and data transmission, the
packets with all the control fields set to 0 are considered as the illegal
packets.
SYN packet with its source port
less than 1024
The attacker sends the illegal packet with its TCP SYN field set to 1 and
source port less than 1024.
Blat Attack The attacker sends the illegal packet with its source port and destination
port on Layer 4 the same and its URG field set to 1. Similar to the Land
Attack, the system performance of the attacked Host is reduced since the
Host circularly attempts to build a connection with the attacker.
Ping Flooding The attacker floods the destination system with Ping broadcast storm
packets to forbid the system to respond to the legal communication.
SYN/SYN-ACK Flooding The attacker uses a fake IP address to send TCP request packets to the
Server. Upon receiving the request packets, the Server responds with
SYN-ACK packets. Since the IP address is fake, no response will be
returned. The Server will keep on sending SYN-ACK packets. If the attacker
sends overflowing fake request packets, the network resource will be
occupied maliciously and the requests of the legal clients will be denied.
Table 12-1 Defendable DoS Attack Types
On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu Network Security→DoS Defend→DoS Defend to load the following page.
165
Содержание
- Jetstream l2 managed poe switch 1
- Tl sg3424p 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 9
- Chapter 1 about this guide 10
- Conventions 10
- Intended readers 10
- Overview of this guide 10
- Chapter 2 introduction 14
- Main features 14
- Overview of the switch 14
- Appearance description 15
- Front panel 15
- Rear panel 17
- Chapter 3 login to the switch 18
- Configuration 18
- Chapter 4 system 20
- System info 20
- System summary 20
- Device description 22
- System time 22
- System ip 24
- User config 25
- User manage 25
- User table 25
- Config backup 27
- Config restore 27
- System tools 27
- Firmware upgrade 28
- Access control 29
- Access security 29
- System reboot 29
- System reset 29
- Ssl config 31
- Ssh config 32
- Application example 1 for ssh 34
- Application example 2 for ssh 35
- Chapter 5 switching 38
- Port config 38
- Port mirror 39
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Mac vlan 66
- Configuration procedure 67
- Protocol vlan 67
- Protocol group 70
- Protocol group table 70
- Protocol template 71
- Configuration procedure 72
- Application example for 802 q vlan 73
- Application example for mac vlan 74
- Application example for protocol vlan 76
- Configuration procedure 80
- Chapter 7 spanning tree 81
- Stp config 86
- Port config 88
- Stp summary 88
- Mstp instance 90
- Region config 90
- Instance config 91
- Instance port config 92
- Global configuration procedure for spanning tree function 94
- Port protect 94
- Stp security 94
- Application example for stp function 97
- Tc protect 97
- Chapter 8 multicast 101
- Igmp snooping 103
- Snooping config 104
- Port config 105
- Vlan config 106
- Configuration procedure 108
- Multicast vlan 108
- Application example for multicast vlan 110
- Configuration procedure 110
- Multicast ip 111
- Multicast ip table 112
- Static multicast ip 112
- Multicast filter 113
- Ip range 114
- Port filter 115
- Configuration procedure 116
- Packet statistics 116
- Chapter 9 qos 118
- Configuration procedure 121
- Diffserv 121
- Port priority 121
- Schedule mode 122
- Configuration procedure 123
- Dscp priority 123
- P priority 123
- Configuration procedure 124
- Bandwidth control 125
- Rate limit 125
- Storm control 126
- Voice vlan 128
- Global config 130
- Port config 130
- Oui config 132
- Configuration procedure of voice vlan 133
- Chapter 10 poe 134
- Poe config 134
- Poe config 135
- Profile config 136
- Poe time range 137
- Time range summary 137
- Poe time range create 138
- Poe holiday config 139
- Chapter 11 acl 141
- Time range 141
- Time range summary 141
- Time range create 142
- Acl config 143
- Holiday config 143
- Acl create 144
- Acl summary 144
- Mac acl 145
- Extend ip acl 146
- Standard ip acl 146
- Policy config 148
- Policy create 148
- Policy summary 148
- Action create 149
- Binding table 150
- Policy binding 150
- Port binding 151
- Vlan binding 151
- Application example for acl 152
- Configuration procedure 152
- Binding table 155
- Chapter 12 network security 155
- Ip mac binding 155
- Manual binding 156
- Arp scanning 158
- Dhcp snooping 159
- Arp inspection 165
- Arp detect 169
- Arp defend 170
- Configuration procedure 170
- Arp statistics 172
- Dos defend 172
- Choose the menu network security dos defend dos defend to load the following page 173
- Dos attack type description 173
- On this page you can enable the dos defend type appropriate to your need 173
- Table 12 1 defendable dos attack types 173
- With dos defend function enabled the switch can analyze the specific fields of the ip packets and distinguish the malicious dos attack packets upon detecting the packets the switch will discard the illegal packets directly and limit the transmission rate of the legal packets if the over legal packets may incur a breakdown of the network the switch can defend a few types of dos attack listed in the following table 173
- Global config 178
- Port config 180
- Radius server 181
- Configuration procedure 182
- Chapter 13 snmp 183
- Global config 185
- Snmp config 185
- Snmp view 186
- Snmp group 187
- Snmp user 188
- Snmp community 190
- Configuration procedure 191
- Notification 192
- Event config 195
- History control 195
- Alarm config 196
- Chapter 14 lldp 199
- Lldp working mechanism 199
- Lldpdu format 199
- Basic config 203
- Global config 203
- The following entries are displayed on this screen 203
- Port config 204
- The following entries are displayed on this screen 204
- Device info 205
- Local info 205
- The following entries are displayed on this screen 205
- Neighbor info 206
- The following entries are displayed on this screen 206
- Device statistics 207
- The following entries are displayed on this screen 207
- Elements 208
- Lldp med 208
- Global config 209
- Port config 209
- The following entries are displayed on this screen 209
- Local info 211
- Neighbor info 212
- The following entries are displayed on this screen 212
- The following entries are displayed on this screen 213
- Chapter 15 cluster 214
- Neighbor info 215
- Ndp summary 216
- Ndp config 218
- Device table 219
- Ntdp summary 220
- Ntdp config 222
- Cluster 223
- Cluster summary 223
- Cluster config 224
- Application example for cluster function 226
- Chapter 16 maintenance 229
- Cpu monitor 229
- System monitor 229
- Memory monitor 230
- Log table 232
- Local log 233
- Remote log 233
- Backup log 234
- Cable test 235
- Device diagnose 235
- Loopback 236
- Network diagnose 236
- Tracert 237
- Appendix a specifications 239
- Appendix b configuring the pcs 240
- Appendix c load software using ftp 243
- Configure the hyper terminal 243
- Hardware installation 243
- Download firmware via bootutil menu 245
- Appendix d 802 x client software 248
- Installation guide 248
- Uninstall software 251
- Configuration 252
- Appendix e glossary 256
Похожие устройства
- Sony HDR-PJ30E Инструкция по эксплуатации
- Tp-Link TL-SG3424 Инструкция по эксплуатации
- Beko CE 58200 Инструкция по эксплуатации
- Asus TAICHI31-CX010H Инструкция по эксплуатации
- Sony STR-DK5 B Инструкция по эксплуатации
- Sony HDR-PJ10E Инструкция по эксплуатации
- Tp-Link TL-SG3216 Инструкция по эксплуатации
- Hotpoint-Ariston AQSL 85 Инструкция по эксплуатации
- Sony XAV-E622 Инструкция по эксплуатации
- Sony HDR-CX7EK Инструкция по эксплуатации
- Tp-Link TL-SG3210 Инструкция по эксплуатации
- Panasonic TC-14X1 Инструкция по эксплуатации
- Sony CDX-GT29 EE Инструкция по эксплуатации
- Sony HDR-CX700VE Инструкция по эксплуатации
- Tp-Link TL-SL3452 Инструкция по эксплуатации
- Panasonic KX-FT21RS Инструкция по эксплуатации
- Sony CDX-GT35 U Инструкция по эксплуатации
- Sony HDR-CX700E Инструкция по эксплуатации
- Tp-Link TL-SL3428 Инструкция по эксплуатации
- Toshiba GR-H64RD Инструкция по эксплуатации