T G W S IP -F X S /F S O G a te w a y S e rie s
User Manual
Tadiran Telecom
87
Dynamic Defense (Blocked IP Addresses) Interface
Figure 2-44
Table 2-39
Dynamic Defense (Blocked IP Addresses) Information
Name
Description
IP address
The IP address of the attacker detected by the device.
Date
The time when the device detects the attacker and initiates defense.
Local port
The port through which the data packet from the attacker is received.
Protocol
The protocol type.
Packets per second
The data packet receiving rate threshold.
You can perform the following operations:
Batch move
: Move the selected entries in batch to the static defense rules, and provides three subsequent choices:
Block
: Add the entry to the static defense list and block the matched packets.
Accept
: Add the entry to the static defense list and accept the matched packets.
Cancel
: Cancel to add the entry to the static defense list.
Table 2-40
Subsequent choices for moving the Blocked IP Addresses to static defense
Handling Method
Description
Applicable Scenario
Block
Add the entry to the static defense list and block
the matched packets.
These entries are confirmed to be attach
sources.
Accept
Add the entry to the static defense list and accept
the matched packets.
These entries are confirmed to be valid
sources (applicable to heavy traffic
scenarios such as call centers).
Cancel
Cancel to add the entry to the static defense list.
/
For details about static defense, see
Batch delete:
Delete selected entries in a batch.
Example
Explanations of the rules listed in
Figure 2-43 are as follows:
Summary of Contents for aeonix TGW4
Page 15: ...Tadiran Telecom xv...
Page 16: ......
Page 133: ...T G W S IP F X S F S O G a te w a y S e rie s User Manual Tadiran Telecom 117...