Draytek Vigor 2100 Series User Manual page 42

Broadband
Table of Contents

Advertisement

The DoS Defense function enables the Vigor router to inspect every incoming packet based on
the attack signature database. Any malicious packet that might duplicate itself to paralyze the
host in the secure LAN will be strictly blocked and a Syslog message will be sent as warning, if
you set up Syslog server.
Also the Vigor router monitors the traffic. Any abnormal traffic flow violating the pre-defined
parameter, such as the number of thresholds, is identified as an attack and the Vigor router will
activate its defense mechanism to mitigate in a real-time manner.
The below shows the attack types that DoS/DDoS defense function can detect:
1. SYN flood attack
2. UDP flood attack
3. ICMP flood attack
4. TCP Flag scan
5. Trace route
6. IP options
7. Unknown protocol
8. Land attack
U
R
L
C
U
R
L
C
To provide an appropriate cyberspace to users, Vigor router equips with URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user's access to the
website. You may imagine URL Content Filter as a well-trained convenience-store clerk who
won't sell adult magazines to teenagers. At office, URL Content Filter can also provide a
job-related only environment hence to increase the employee work efficiency. How can URL
Content Filter work better than traditional firewall in the field of filtering? Because it checks
the URL strings or some of HTTP data hiding in the payload of TCP packets while legacy
firewall inspects packets based on the fields of TCP/IP headers only.
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It's very common that malicious codes conceal in the executable objects,
such as ActiveX, Java Applet, compressed files, and other executable files. Once downloading
these types of files from websites, you may risk bringing threat to your system. For example, an
ActiveX control object is usually used for providing interactive web feature. If malicious code
hides inside, it may occupy user's system.
W
e
b
F
W
e
b
F
We all know that the content on the Internet just like other types of media may be
inappropriate sometimes. As a responsible parent or employer, you should protect those in your
trust against the hazards. With Web filtering service of the Vigor router, you can protect your
business from common primary threats, such as productivity, legal liability, network and
security threats. For parents, you can protect your children from viewing adult websites or chat
rooms.
Once you have activated your Web Filtering service in Vigor router and chosen the categories of
website you wish to restrict, each URL address requested (e.g.www.bbc.co.uk) will be checked
against our server database, powered by SurfControl. The database covering over 70 languages
and 200 countries, over 1 billion Web pages divided into 40 easy-to-understand categories. This
database is updated as frequent as daily by a global team of Internet researchers. The server will
look up the URL and return a category to your router. Your Vigor router will then decide
whether to allow access to this site according to the categories you have selected. Please note
36
o
n
t
e
n
t
F
i
l
t
e
r
i
n
g
o
n
t
e
n
t
F
i
l
t
e
r
i
n
g
i
l
t
e
r
i
n
g
i
l
t
e
r
i
n
g
9. Smurf attack
10. SYN fragment
11. ICMP fragment
12. Tear drop attack
13. Fraggle attack
14. Ping of Death attack
15. TCP/UDP port scan
Vigor2100 Series User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigor2100vVigor2100vgVigor2100g

Table of Contents