157
Figure 164 Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in Figure 165, internal users Host A, Host B, and Host C access the Internet through Router.
The network security requirements are as follows:
• Router always drops packets from Host D, an attacker.
• Router denies packets from Host C for 50 minutes for temporary access control of Host C.
• Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
• Router provides Land attack protection and Smurf attack protection.