Intrusion: | Detects 11 types of denial of service (DOS) attacks including: |
| ping of death (illegal ping packet), SYN flood (detects if SYN |
| is from the same source), LAND attack (same source and |
| destination addresses), IP spoofing (simulates a LAN |
| packet), Code Red 1 (pattern I), Code Red II (pattern II), UDP |
| loopback (illegal UDP echo), smurf attack (ping with destina- |
| tion address as broadcast), snork attack (same source and |
| destination port), TCP null scan (SYN packets with sequence |
| = 0) and zero length IP option (illegal ICMP IP fragment). |
| Detects, logs and reports all suspicious activities. |
Access Control: | Limits wireless LAN traffic only to registered computers with |
| specified hardware (MAC) address |
Business Controls: | Blocks access to certain websites (URL) |
Applications Interoperability |
|
Microsoft: | Universal |
Apple: | AppleTalk and QuickTime. |
Messaging: | H.323, AOL Instant Messenger, ICQ and MIRC |
Others: | RealPlayer, Dialpad, Quake, |
Tournament |
|
Standards Compliance |
|
Network: | IEEE 802.3u Fast Ethernet over 2 pairs of UTP Category 5 |
| (100BaseTX) |
| IEEE 802.3 Ethernet over 2 pairs of UTP Category 3 |
| (10BaseT) |
| VR2004AC: IEEE 802.11b Wireless Ethernet over 2.4GHz |
VPN Encryption: | NULL, |
Triple DES (3DES) |
|
Wireless Encryption: | VR2004AC: 64- and |
Authentication: | IP Authentication Header (AH), MD5 (RFC 1321), |
secure hash algorithm (NIS94c) |
|
Password: | Password authentication protocols PAP, CHAP (RFC 1334) |
and MSCHAP |
|
Key Management: | Internet Key Exchange (IKE, RFC2409) incorporating |
ISAKMP, Oakley, and Skeme | IP Encapsulating Security Payload (ESP, RFC 1827) |
| |
Routing: | Routing information protocols RIP 1 (RFC 1058), RIP Version |
2 (RFC 1721) |
|
Translation: | Network Address Translation (NAT, RFC 1631) |
Transmission: | Point to Point Protocol over Ethernet (PPPoE, RFC 2516) |
| and Point to Point Tunneling Protocol (PPTP) |
User’s Manual | 67 |
|