Live Chat
  • One stop service: solve all your problems
  • Orders Tracking and shipped out notification
  • More campaigns, even more discounts!
  • Need help before making an order?
  • Chat with us in real-time.
  • For Aftersale issues, just submit a ticket. We will reply within 24 hours.
  • Multi-language service
  • 24/7 support available
Hi! Log Out Log In SIGN UP
Home > How To > The setting method of DOS attack Protection of Mercury Wireless Router
The setting method of DOS attack Protection of Mercury Wireless Router

The setting method of DOS attack Protection of Mercury Wireless Router

By  Beltran Cignetti 2020-01-04 2301 163

DoS (Denial of Service, denial of service (denial of service) is a kind of network attack that uses a large number of virtual information flow to deplete the resources of the target host, and the target host is forced to deal with false information flow, so that legitimate users can not get service response. Under normal circumstances, the speed of the router will slow down as a result of this attack.

In our wireless router, we can detect and prevent several common DoS attacks such as ICMP-FLOOD, UDP-FLOOD, TCP-SYN-FLOOD and so on. In the router management interface "Security Settings"-"Advanced Security options", you can use the default parameters, or you can set your own parameters to detect these DOS attacks. The configuration interface is as follows:


ICMP Flood (ICMP flooding): when a large number of response requests generated by ICMP ping exceed the maximum limit of the system, so that the system consumes all resources to respond until it can no longer handle effective network information flow, ICMP flooding occurs.

UDP Flood (UDP flooding): similar to ICMP flooding, UDP flooding occurs when UDP packets are sent to that point in order to slow down the system so that the system can no longer handle valid connections.

SYN Attack (SYN attack): a SYN flooding attack occurs when the network is full of SYN packets that issue connection requests that cannot be completed, so that the network can no longer process legitimate connection requests, resulting in a denial of service (DoS).

Our wireless router's judgment against DoS attacks is based on setting a threshold (in units of packets per second PPS=Packet Per Second),). If a certain packet exceeds the set threshold within a specified time interval (1 second), it is determined that a flooding attack has occurred, then this type of packet from the same attack source is ignored in the next 2 seconds. At the same time, put the host in the list of DoS banned hosts. The smaller the value here, the more "sensitive" it is, but generally it can't be too small. Too small will affect the normal application of some network functions. We can adjust dynamically according to our own environment in practical application. Under normal circumstances, we can use our factory default value.


 You may also want to read:
 Does the HUAWEI FreeBuds 3 Work Well With iPhone?
 Honor Magic Watch 2 VS Amazfit Stratos 3: Which Smart Running Watch is Better?
 EMUI 10 Always-On Display (AOD) feature: supported devices and everything you need to know about it
 HUAWEI Band 4 Pro VS Band 4 VS Band 3 Pro: What are the Differences Between these there Smart Band?

Gearbest Daily deals up to 69 percent off

Extensive Product Selection

● Over 300,000 products

● 20 different categories

● 15 local warehosues

● Multiple top brands

Convenient Payment

● Global payment options: Visa, MasterCard, American Express

● PayPal, Western Union and bank transfer are accepted

● Boleto Bancario via Ebanx (for Brazil)

Prompt Shipping

● Unregistered air mail

● Registered air mail

● Priority line

● Expedited shipping

Dedicated After-sales Service

● 45 day money back guarantee

● 365 day free repair warranty

● 7 day Dead on Arrival guarantee (DOA)

Prev article:EDUP EP-MS150NW Mini Wireless Card: one of the smallest Wireless Network Cards in the World

Next article:What are the brands of world-class audio equipment? world-class audio equipment brand introduction [detailed explanation]

You might also like: