Template:Security guidelines: Difference between revisions

From Teltonika Networks Wiki
(Created page with " <table class="nd-othertables"> <tr> <th width="200">Security measurement type</th> <th width="200">Security measurement name</th> <th width="200">...")
 
No edit summary
Line 1: Line 1:


<table class="nd-othertables">
<table class="wikitable">
     <tr>
     <tr>
         <th width="200">Security measurement type</th>
         <th width="200">Security measurement type</th>
Line 11: Line 11:
       <td>SYN Flood Protection</td>
       <td>SYN Flood Protection</td>
       <td>On</td>
       <td>On</td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic./td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>Remote ICMP Requests</td>
       <td></td>
       <td>On</td>
       <td></td>
       <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td>
    </tr>
    <tr>
      <td>SSH Attack Prevention</td>
      <td>Off</td>
      <td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>HTTP Attack Prevention</td>
       <td></td>
       <td>Off</td>
       <td></td>
       <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>HTTPS Attack Prevention</td>
       <td></td>
       <td>Off</td>
       <td></td>
       <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td rowspan="5"> DDOS Prevention</td>
       <td></td>
       <td>SYN Flood Protection</td>
       <td></td>
       <td>On</td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
     </tr>
     </tr>
</table>
</table>

Revision as of 13:10, 27 January 2020

Security measurement type Security measurement name By default Details
DDOS Prevention SYN Flood Protection On A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
Remote ICMP Requests On An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).
SSH Attack Prevention Off A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.
HTTP Attack Prevention Off A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.
HTTPS Attack Prevention Off HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP
DDOS Prevention SYN Flood Protection On A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.