Cisco RVS4000 - Gigabit Security Router User's Guide Page 10

  • Download
  • Add to my manuals
  • Print
  • Page
    / 83
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 9
3
Networking and Security Basics
4-Port Gigabit Security Router with VPN
Chapter 2
client PCs and servers running various operating systems
including Windows, Linux, and Solaris from network worm
attacks. However, this system does not prevent viruses
contained in email attachments.
The P2P (peer-to-peer) and IM (instant messaging) control
allows the system administrator to prevent network users
from using those protocols to communicate with people
over the Internet. This helps the administrators to set up
company policies on how to use the Internet bandwidth
wisely.
The signature file is the heart of the IPS system. It is similar
to the Virus definition file on your PC’s Anti-Virus software.
IPS uses this file to match against packets coming into the
Router and performs actions accordingly. The RVS4000 is
shipped with a signature file containing 1000+ rules, which
cover the following categories: DDoS, Buffer Overflow,
Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus,
Worm, and Web Attacks.
Customers are encouraged to update their IPS signature
file regularly to prevent any new types of attacks on the
Internet.
IPS Scenarios
Page view 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 82 83

Comments to this Manuals

No comments