[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Reconnaissance Deterrence Overview

Attackers can better plan their attack when they first know the layout of the targeted network (which IP addresses have active hosts), the possible entry points (which port numbers are active on the active hosts), and the constitution of their victims (which operating system the active hosts are running). To gain this information, attackers must perform reconnaissance.

Before You Begin

For background information, read Attack Detection and Prevention.

Juniper Networks provides several SCREEN options to deter attackers' reconnaissance efforts and thereby hinder them from obtaining valuable information about the protected network and network resources.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]