Hot search terms: 360 Security Guard Office365 360 browser WPS Office iQiyi Huawei Cloud Market Tencent Cloud Store
Server class Storage size: 33.4MB Time: 2016-11-08
Software introduction: Server Security Dog is a comprehensive server security protection tool that integrates server security protection and security management. Server security dog...
The server lays the foundation for Internet access. If the server is attacked, the entire network will collapse, so server security measures still need to be prepared. The server security dog DDOS protection function is a very important function. If it is set up well, it will not be so easy for others to attack.
Next, let’s take a detailed look at the DDOS attack protection capabilities and settings:
DDOS protection
Users can turn on/off the DDOS firewall function by clicking the "On"/"Off" button in the upper right corner of the operation interface. It is recommended that users turn on the DDOS firewall immediately after installing the server security dog. Only when the DDOS firewall is turned on can the defense against DDOS attacks be realized, as shown in the figure below:
DDOS protection
Parameter settings: All parameters of the DDOS firewall are settings for a single IP. All parameters are the best values obtained based on experimental tests, so it is generally recommended that users directly use the system default settings. At the same time, during use, users can also modify various parameter values at any time according to the actual attack situation, as shown in the figure:
DDOS protection
Here we introduce these parameters in detail.
"IP freezing time" is used to set the length of time that IPs judged as attacks by the security dog will be banned from access. The time unit is minutes. The value must be an integer greater than 1. The user can modify the length of time to restrict access according to the attack situation. , as shown in the figure below:
DDOS protection
"SYN attack" sets the number of TCP connection request responses for a single IP per unit time. This function is used for SYN attack protection. The time unit is seconds. The value must be an integer greater than 1. Generally, the default parameter 500 is used. If the attack situation If it is more serious, you can appropriately lower the connection request parameters. So what is TCP? This involves the TCP/IP protocol.
TCP/IP (Transmission Control Protocol/Internet Protocol) is an industrial standard protocol set designed for wide area networks (WAN).
How to set up safe decompression of files in 360 Secure Browser? -How to set up safe decompression of files in 360 Secure Browser
How to install plug-in for 360 Secure Browser? -How to install plug-ins for 360 Secure Browser
How to clear the cache of 360 Secure Browser? -How to clear the cache of 360 Safe Browser
How to upgrade 360 Secure Browser? -How to upgrade the version of 360 Secure Browser
How to switch accounts to log in to iQiyi? -How to log in to iQiyi account switching account
What to do if there is no sound after reinstalling the computer system - Driver Wizard Tutorial
How to practice typing with Kingsoft Typing Guide - How to practice typing with Kingsoft Typing Guide
How to upgrade the bootcamp driver? How to upgrade the bootcamp driver
How to change QQ music skin? -QQ music skin change method
Driver President Download-How to solve the problem when downloading driver software is very slow