EasyManuals Logo
Home>D-Link>Network Router>DSR-150

D-Link DSR-150 User Manual

D-Link DSR-150
378 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #213 background imageLoading...
Page #213 background image
D-Link DSR-Series User Manual 199
Section 8 - Security
Attack Checks
Path: Security > Firewall > Attack Checks
Attacks can be malicious security breaches or unintentional network issues that render the router unusable
Attack checks allow you to manage WAN security threats such as continual ping requests and discovery via ARP
scans. TCP and UDP ood attack checks can be enabled to manage extreme usage of WAN resources.
Additionally certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if uninhibited, can use up
processing power and bandwidth and prevent regular network services from running normally. ICMP packet
ooding, SYN trac ooding, and Echo storm thresholds can be congured to temporarily suspect trac from
the oending source.
1. Click Security > Firewall > Attack Checks.
2. Complete the elds from the table below and click Save.
Field Description
Stealth Mode
If this option is toggled to ON, the router will not respond to port scans from the WAN. This makes it
less susceptible to discovery and attacks.
Block TCP Flood
If this option is toggled to ON, the router will drop all invalid TCP packets and be protected from a
SYN ood attack.
Filter Check
If this option is enabled, then router will drop invalid TCP packets(FIN,RST and ACK) going with
SNAT while the connection is closed. Some of the other packets like TCP OUT-OF-WINDOW are also
considered to be invalid. Disable this option while taking performance in Ixia setup as enabling this
option will eect the throughput.
Block UDP Flood
If this option is toggled to ON, the router will not accept more than the congured value in UDP
Connection Limit which indicates simultaneous, active UDP connections from a single computer
on the LAN. You can set the number of simultaneous active UDP connections to be accepted from a
single computer on the LAN; the default is 25 and the range is 25 to 500.
Block ICMP Notication
Toggle to ON to prevent ICMP packets from being identied as such. ICMP packets, if identied, can
be captured and used in a Ping (ICMP) ood DoS attack.
Block Fragmented Packets Toggle to ON to drop any fragmented packets through or to the gateway

Table of Contents

Other manuals for D-Link DSR-150

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link DSR-150 and is the answer not in the manual?

D-Link DSR-150 Specifications

General IconGeneral
Ethernet LANYes
Cabling technology10/100Base-T(X)
Networking standardsIEEE 802.1Q, IEEE 802.3, IEEE 802.3u
Ethernet LAN data rates10, 100 Mbit/s
Ethernet interface typeFast Ethernet
PC in (D-Sub)No
USB ports quantity0
Ethernet LAN (RJ-45) ports8
Supported network protocolsIPSec, PPTP, L2TP
Security algorithms3DES, DES, SSL/TLS
VPN tunnels quantity21
Filtering descriptionKeyword
MAC address filtering-
SafetycUL, LVD (EN60950-1)
CertificationWEEE
Electromagnetic compatibilityFCC Class B, CE Class B, C-Tick, IC
Mean time between failures (MTBF)240000 h
Input current1.5 A
AC input voltage100 - 240 V
AC input frequency50 - 60 Hz
Power consumption (typical)7.44 W
Storage temperature (T-T)-20 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)5 - 95 %
Product colorBlack
Input voltage12 V
Ports quantityThe number of ports or external interfaces to which other equipment can be connected.
Management platformHTTP, HTTPS, CLI, SNMP v1/v2c/v3
Connectivity technologyWired
Compliance industry standardsRoHS
Weight and Dimensions IconWeight and Dimensions
Depth118 mm
Width208 mm
Height35 mm
Weight- g

Related product manuals