Difference between revisions of "Template:Security guidelines"
From Teltonika Networks Wiki
(Created page with " <table class="nd-othertables"> <tr> <th width="200">Security measurement type</th> <th width="200">Security measurement name</th> <th width="200">...") |
|||
Line 1: | Line 1: | ||
− | <table class=" | + | <table class="wikitable"> |
<tr> | <tr> | ||
<th width="200">Security measurement type</th> | <th width="200">Security measurement type</th> | ||
Line 11: | Line 11: | ||
<td>SYN Flood Protection</td> | <td>SYN Flood Protection</td> | ||
<td>On</td> | <td>On</td> | ||
− | <td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic./td> | + | <td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td></td> | + | <td>Remote ICMP Requests</td> |
− | <td></td> | + | <td>On</td> |
− | <td></td> | + | <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td> |
+ | </tr> | ||
+ | <tr> | ||
+ | <td>SSH Attack Prevention</td> | ||
+ | <td>Off</td> | ||
+ | <td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td></td> | + | <td>HTTP Attack Prevention</td> |
− | <td></td> | + | <td>Off</td> |
− | <td></td> | + | <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td></td> | + | <td>HTTPS Attack Prevention</td> |
− | <td></td> | + | <td>Off</td> |
− | <td></td> | + | <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> |
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td></td> | + | <td rowspan="5"> DDOS Prevention</td> |
− | <td></td> | + | <td>SYN Flood Protection</td> |
− | <td></td> | + | <td>On</td> |
+ | <td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td> | ||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 14:10, 27 January 2020
Security measurement type | Security measurement name | By default | Details |
---|---|---|---|
DDOS Prevention | SYN Flood Protection | On | A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |
Remote ICMP Requests | On | An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). | |
SSH Attack Prevention | Off | A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests. | |
HTTP Attack Prevention | Off | A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests. | |
HTTPS Attack Prevention | Off | HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP | |
DDOS Prevention | SYN Flood Protection | On | A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |