TCPware v5.9 Features
Features |
Description |
Intrusion Prevention System (IPS) |
The IPS feature monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. TCPware SSH, FTP, SNMP, Telnet, IMAP, SMTP, and POP3 have been instrumented with IPS to monitor traffic for malicious attacks. It is highly flexible and customizable. When an attack is detected, pre-configured rules will block an intruder’s IP address from accessing the TCPware system, prevent an intruder from accessing a specific application, or both. The time period that the filter is in place is configurable. An API is provided so that TCPware customers can incorporate the IPS functionality into their applications. |
Kernel Performance Improvements |
Kernel performance has been enhanced for AXP and Itanium by eliminating occurrences of alignment faults. |
BIND 9.6.1 Server Upgrade |
This upgrade includes the following:
|
SSH Upgrade |
The SSH code base has been upgraded to include a number of bug fixes. |
| FTP RESTART Command | This feature allows an FTP transfer (which has been interrupted) to be restarted where the transfer left off. This applies to stream mode transfers only (RFC 3659). |
| Ephemeral Port Randomization | Typically ports were issued in sequential order, which poses a security risk. There is the potential for blind attacks, which can range from throughput-reduction to broken connections or data corruption. This feature issues random port numbers, which makes it more difficult for an attacker to guess a local port number and disrupt communications. |
| IMAP Update | IMAP has been updated to the latest version of the University of Washington code base. |
| Other Features |
|
