Cisco WRVS4400N - Small Business Wireless-N Gigabit Security Router Guide de l'utilisateur Page 16

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 134
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 15
8
Chapter 2: Networking and Security Basics
The Intrusion Prevention System (IPS)
Wireless-N Gigabit Security Router with VPN
The P2P (peer to peer) and IM (instant messaging) control allows the system administrator to prevent network
users from using those protocols to communicate with people over the Internet. This helps the administrators to
set up company policies on how to use their Internet bandwidth wisely.
The signature file is the heart of the IPS system. It is similar to the Virus definition files on your PC’s Anti-Virus
programs. IPS uses this file to match against packets coming in to the Router and performs actions accordingly.
As of today, the Wireless-N Router is shipped with signature file version 1.1.4 and with a total of 1048 rules. The
rules cover the following categories: DDoS, Buffer Overflow, Access Control, Scan, Trojan Horse, Misc., P2P, IM,
Virus, Worm, and Web Attacks.
Customers are encouraged to update their IPS signature file regularly to prevent any new type of attacks on the
Internet.
Vue de la page 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 133 134

Commentaires sur ces manuels

Pas de commentaire