Network Equipment filters

Filters that detect and block the malicious attacks that target equipment accessible through a network. Network attacks can broadly or specifically seek access and data to corrupt on a network. These filters are part of the Infrastructure Protection filter category.

notification contacts

Recipients of alert messages. These contacts receive an email alert when a filter with the proper notification contacts settings triggers. Contacts include staff with email accounts and the SMS application.

P2P filters

Filters that use the same algorithms as attack filters, but which block peer-to-peer protocol traffic. These protocols are primarily used to share music and video files. They essentially turn a personal computer into a file server which make its resources as well as those of its host network available to the peer-to-peer community. These filters are part of the Performance Protection filter category.

packet trace

Allows you to capture all or part of a suspicious packet for analysis. You can set the packet trace priority and packet trace verbosity for action sets.

Performance Protection

Category of filter types that allow key applications to have prioritized access to bandwidth ensuring that mission critical applications have adequate performance during times of high congestion. These filters include misuse and abuse, IP, and congestion/mitigation filters.

Port Scan/Host Sweep filters

Filters that perform port scans and host sweeps to prevent any malicious code, attacks, and exceeded threshold limits for traffic. Each filter scans a specific type of port and protocol to block attacks against ports and hosts. These filters are part of the Application Protection filter category.

PPTP (Point-to-Point Tunneling Protocol)

Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks. PPTP supports on-demand, multi-protocol, virtual private networking over public networks, such as the Internet.

rate limiting

Setting in an action set that defines a maximum bandwidth that can be used by traffic that matches filters assigned to that action set. Incoming traffic in excess of this bandwidth is dropped. If two or more filters use the same rate limiting action set, then all packets matching these filters share the bandwidth.

Reconnaissance filters

Reconnaissance filters monitor traffic for events that indicate network activity usually associated with common information gathering techniques used by attackers to launch more sophisticated attacks. These attacks search through your network using various methods to locate vulnerabilities. After the

X Family LSM User’s Guide V 2.5.1

311