F3215-HP Load Balancing Module Security Configuration Guide-6PW101
176
accordingly, as configured. Supported actions include outputting alarm logs, discarding packets, and
adding the attacker to the blacklist.
The intrusion detection statistics reflect the counts of attacks as per attack type, and the counts of attack
packets dropped. This helps you analyze the intrusion types and quantities present to generate better
network security policies.
For information about packet inspection and traffic abnormality detection, see "Types of network attacks
the de
v
ice can defend against."
Configuring attack detection and protection in the
Web interface
Configuring packet inspection
1. From the navigation tree, select Security > Intrusion Detection > Packet Inspection.
Figure 76 Packet inspection configuration page
2. Configure packet inspection, as described in Table 20.
3. Click Apply.
Table 20 Configuration items
Item Descri
p
tion
Zone
Select a zone to detect attacks from the zone.
Discard Packets when the specified attack is detected Select this option to discard detected attack packets.
Enable Fraggle Attack Detection
Enable or disable detection of Fraggle attacks.
Enable Land Attack Detection
Enable or disable detection of Land attacks.