Linksys WRVS4400N Network Router User Manual


 
8
Chapter 2: Networking and Security Basics
The Intrusion Prevention System (IPS)
Wireless-N Gigabit Security Router with VPN
The P2P (peer to peer) and IM (instant messaging) control allows the system administrator to prevent network
users from using those protocols to communicate with people over the Internet. This helps the administrators to
set up company policies on how to use their Internet bandwidth wisely.
The signature file is the heart of the IPS system. It is similar to the Virus definition files on your PC’s Anti-Virus
programs. IPS uses this file to match against packets coming in to the Router and performs actions accordingly.
As of today, the Wireless-N Router is shipped with signature file version 1.1.4 and with a total of 1048 rules. The
rules cover the following categories: DDoS, Buffer Overflow, Access Control, Scan, Trojan Horse, Misc., P2P, IM,
Virus, Worm, and Web Attacks.
Customers are encouraged to update their IPS signature file regularly to prevent any new type of attacks on the
Internet.