Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents
minLevel1
maxLevel6
outlinefalse
styledisc
typelist
printabletrue

Configuration of the Anti-Hacking

Anti-Hacking is a system-level defense we do to prevent malicious access attacks. We can automatically add an access IP to the blacklist by limiting the access rate and the number of access failures in a period of time.  The system administrator can set the time to automatically release the blacklist, or he can manually unblock the IP.

Configuration of the Anti-Hacking

...

Configuration details

  • Failed Authentication Protection

          Configure the amount of failed authentications that the System will accept. If this value is exceeded, the source IP address is put in the Blacklist.

  • Web chat Requests Protection

          Maximum allowed requests per IP Address-Offending IPs will be blacklisted.

  • Request Rate Duration

Configure the duration in seconds in which the above requests are counted.

  • Blacklist time interval

          This is the time interval in seconds that an abusive IP Address remain in the blacklist.

Visitor Request Setting

Configure the request frequency of tenant-side visitors, and Set a wait interval for visitors when they exceed the limit.

...

Setting Details

  • Visitor Requests Protection

Set the maximum number of requests for visitors

  • Request Rate Duration

Configure the duration in seconds in which the above requests are counted

  • Wait Interval

When a guest request reaches the limit, it is prompted how long to wait before the message can be resent