Hi friend!
At present, the router faces the following security risks:
owing to the inherent defects and flawed implementation of the TCP/IP protocol suite, attacks on the TCP/IP network are increasing, which greatly impacts the network;
when a large number of packets are sent to the CPU at the same time, the packet sending rate cannot be limited and as a result, the CPU cannot process these packets by priority;
the router runs multiple application protocols and all these application protocols, including those unnecessary, send packets to the CPU. Hackers can thus exploit such a security vulnerability to launch flooding attacks to exhaust CPU resources, preventing the process of normal services;
interfaces on the router can be classified into management interfaces and non-management interfaces. Hackers can control the router through non-management interfaces or launch flooding attacks through management interfaces. All these put the router in danger;
attack packets are of various types and once attacked, the router cannot trace the attack source;
a large number of packets are discarded, but no alarm message is generated.
You can protect the CPU of the NE40E against attacks by configuring defense against TCP/IP attacks, CAR, application layer association, management plane protection, or attack source tracing.
Hope this helps!