Intrusion Detection for the SMC WBR14S-Nv2Router Sceenshot
Intrusion Detection When the SPI (Stateful Packet Inspection) firewall feature is enabled, all packets can be blocked. Stateful Packet Inspection (SPI) allows full support of different application types that are using dynamic port numbers. For the applications checked in the list below, the Device will support full operation as initiated from the local LAN. The Device firewall can block common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. Enable SPI and Anti-DoS firewall protection: Yes No --> Intrusion Detection Feature SPI and Anti-DoS firewall protection RIP defect Discard Ping To WAN Interface Stateful Packet Inspection Packet Fragmentation TCP Connection UDP Session FTP Service H.323 Service TFTP Service When hackers attempt to enter your network, we can alert you by e-mail Your E-mail Address : SMTP Server Address : POP3 Server Address : User name : Password : Connection Policy Fragmentation half-open wait: secs TCP SYN wait: sec. TCP FIN wait: sec. TCP connection idle timeout: sec. UDP session idle timeout: sec. H.323 data channel idle timeout: sec. DoS Detect Criteria: Total incomplete TCP/UDP sessions HIGH: session Total incomplete TCP/UDP sessions LOW: session Incomplete TCP/UDP sessions (per min) HIGH: session Incomplete TCP/UDP sessions (per min) LOW: session Maximum incomplete TCP/UDP sessions number from same host: Incomplete TCP/UDP sessions detect sensitive time period: msec. Maximum half-open fragmentation packet number from same host: Half-open fragmentation detect sensitive time period: msec. Flooding cracker block time: sec.