Cisco RVS4000 - Gigabit Security Router Guide de l'utilisateur Page 10

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 83
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 9
3
Networking and Security Basics
4-Port Gigabit Security Router with VPN
Chapter 2
client PCs and servers running various operating systems
including Windows, Linux, and Solaris from network worm
attacks. However, this system does not prevent viruses
contained in email attachments.
The P2P (peer-to-peer) and IM (instant messaging) control
allows the system administrator to prevent network users
from using those protocols to communicate with people
over the Internet. This helps the administrators to set up
company policies on how to use the Internet bandwidth
wisely.
The signature file is the heart of the IPS system. It is similar
to the Virus definition file on your PC’s Anti-Virus software.
IPS uses this file to match against packets coming into the
Router and performs actions accordingly. The RVS4000 is
shipped with a signature file containing 1000+ rules, which
cover the following categories: DDoS, Buffer Overflow,
Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus,
Worm, and Web Attacks.
Customers are encouraged to update their IPS signature
file regularly to prevent any new types of attacks on the
Internet.
IPS Scenarios
Vue de la page 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 82 83

Commentaires sur ces manuels

Pas de commentaire