Changes

no edit summary
Line 1: Line 1:    −
<table class="nd-othertables">
+
<table class="wikitable">
 
     <tr>
 
     <tr>
 
         <th width="200">Security measurement type</th>
 
         <th width="200">Security measurement type</th>
Line 11: Line 11:  
       <td>SYN Flood Protection</td>
 
       <td>SYN Flood Protection</td>
 
       <td>On</td>
 
       <td>On</td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic./td>
+
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td></td>
+
       <td>Remote ICMP Requests</td>
       <td></td>
+
       <td>On</td>
       <td></td>
+
       <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td>
 +
    </tr>
 +
    <tr>
 +
      <td>SSH Attack Prevention</td>
 +
      <td>Off</td>
 +
      <td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td></td>
+
       <td>HTTP Attack Prevention</td>
       <td></td>
+
       <td>Off</td>
       <td></td>
+
       <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td></td>
+
       <td>HTTPS Attack Prevention</td>
       <td></td>
+
       <td>Off</td>
       <td></td>
+
       <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td></td>
+
       <td rowspan="5"> DDOS Prevention</td>
       <td></td>
+
       <td>SYN Flood Protection</td>
       <td></td>
+
       <td>On</td>
 +
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
 
     </tr>
 
     </tr>
 
</table>
 
</table>
0

edits