TP-Link TL-ER604W manual Flood Defense, Packet Anomaly, Enable Attack, Defense Logs

Page 86

Figure 3-53Attack Defense

The following items are displayed on this screen:

General

 

Flood Defense:

Flood attack is a commonly used DoS (Denial of Service) attack,

 

including TCP SYN, UDP, ICMP and so on. It is recommended to

 

select all the Flood Defense options and specify the

 

corresponding thresholds. Keep the default settings if you are not

 

sure.

Packet Anomaly

Packet Anomaly refers to the abnormal packets. It is

Defense:

recommended to select all the Packet Anomaly Defense options.

Enable Attack

With this box checked, the Router will record the defense logs.

Defense Logs:

 

 

-81-

Image 86
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III 149 Hardware Specifications 148Application 130 Glossary 151Package Contents Conventions Symbol DescriptionIntended Readers Overview of this GuideOverview of the Router Features Security WirelessTraffic Control  LEDs AppearanceFront Panel Status IndicationRear Panel Status System ModeNetwork Page  Non-NAT Mode WAN Mode NAT Mode  Classic ModeTips  WAN Mode3.2 WAN1 Static IPWAN Static IP Following items are displayed on this screen  Static IPConnection Type Dynamic IP Dynamic IP Host NameUse the following DNS Get IP Address byUnicast ServerPPPoE WAN PPPoESettings Keep Alive PasswordActive Mode Account NameSecondary Connection Service NameISP Address Subnet AddressGateway Address L2TP L2TP Settings 10 WAN L2TP Following items are displayed on this screenConnection Default GatewaySecondary  L2TP Status Pptp Pptp Settings Server IPInternet connection by the Connect or Disconnect  Pptp Status BigPond BigPond Settings 12 WAN Bigpond Following items are displayed on this screen BigPond Status ISPDhcp 4 LAN4.1 LAN  Dhcp Settings  Dhcp Reservation Dhcp ClientDhcp Reservation Set the MAC Address for LAN port MAC Address List of Reserved Address Set the MAC Address for WAN port MAC Address SwitchStatistics PortPort Mirror  StatisticsMirroring Port Enable Port MirrorMode Mirrored Port Rate Control Rate ControlApplication Example Port Config  Port Config Port Vlan Port StatusPort Vlan Wireless Setting WirelessWireless Setting  Wireless Setting Wireless Parameter AP Isolation DescriptionSsid Broadcast SecurityWPA/WPA2 WEP Hexadecimal and Ascii formats are Multi-SSIDKey Format  Multi-SSID Config  GeneralEnable/Disable Guest NetworkEncryption Group KeyAuth Type 1.3 WDS  List of GroupBSSIDto be bridged Scan Parameter Key TypeKey : Wireless Advanced Wireless Advanced Short GIMAC Filtering  Rule List Host Status Filtering Rules  Host Status User GroupGroup User  Group Config User Config  List of User  View ConfigView View1 NAT NAT SetupAdvanced One-to-One NAT  One-to-One NAT Multi-Nets NAT Multi-Nets NAT List of Rules Configuration procedure Application Example Network RequirementsVirtual Server Protocol  Virtual ServerInterface Port Triggering  Port Triggering1.6 ALG 38 ALG Following items are displayed on this screen323 ALG SetupTraffic Control IPsec ALGLimited ControlControl all the time UpstreamBandwidth Control Limited Bandwidth Session LimitSession Limit Session List  List of Session LimitPolicy Routing ConfigurationLoad Balance WAN Link Backup 45 Link Backup Following items are displayed on this screenTiming WAN ConfigProtocol Failover Protocol RoutingStatic Route  List of Protocol47 Static Route Following items are displayed on this screen  Static Route5.2 RIP 48 RIP Following items are displayed on this screen  List of RIPRoute Table IP-MAC Binding FirewallAnti ARP Spoofing ARP Scanning  IP-MAC BindingARP List Attack Defense Packet Anomaly Enable AttackFlood Defense DefenseURL Filtering Access ControlMAC Filtering  MAC Filtering URL Filtering Rule ObjectAccess Rules Web FilteringPolicy  Access RulesService SourceDestination ServiceGroup on 3.3.1 Group PriorityName  Service List of Service Dest. Port Control Rules App ControlControl Rules ApplicationVPN Database1 IKE IKE Policy62 IKE Policy Following items are displayed on this screen  IKE PolicyIKE Proposal 63 IKE Proposal Following items are displayed on this screen  IKE Proposal List of IKE Proposal IPsecIPsec Policy Local Subnet  IPsec PolicyPolicy Name Remote Gateway Policy ModeRemote Subnet IKE PolicyAH Authentication Key-Out AH Authentication Key-InESP Authentication Key-In ESP Authentication Key-Out IPsec Proposal IPsec Proposal List of IPsec Policy IPsec  List of IPsec Proposal IPsec SA Protocol Media Tunnel Length of Header Authentication3 L2TP/PPTP 3.1 L2TP/PPTP Tunnel  L2TP/PPTP TunnelL2TP/PPTP Server TunnelMax Connections Pre-shard KeyList of L2TP/PPTP Tunnel  List of ConfigurationsIP Address Pool  IP Address PoolGeneral ServicesPPPoE Server 70 General Following items are displayed on this screen IP Address Pool IP Address Assigned Account Account Static IP Address List of Account Is 48. If Enable Advanced Account Features is not selected,Exceptional IP  Exceptional IP BulletinList of Account Title Interval E-Bulletin  List of E-Bulletin Dynamic DNSPublisher DynDNS  Dyndns Ddns No-IP Ddns No-IP List of DynDNS Account  PeanutHull Ddns PeanutHull List of No-IP Account Comexe  List of PeanutHull Account List of Comexe Account UPnP Comexe Ddns Administrator MaintenanceAdmin Setup  List of UPnP MappingLogin Parameter  AdministratorRemote Management  Remote Management List of Subnet Factory DefaultsManagement Export and Import Reboot Configuration Version  ExportFirmware Upgrade License Interface Traffic Statistics StatisticsInterface Traffic Statistics 123IP Traffic Statistics  Advanced WAN Information Traffic Statistics DiagnosticsDiagnostics  IP Traffic Statistics Tracert Online Detection Ping DNS Lookup TimePing Port Displays the detected WAN port DetectionLogs Severity  Config List of Logs Send System LogsApplication Network RequirementsSystem Mode Network Topology ConfigurationsInternet Setting System Mode Internet ConnectionSettings VPN SettingIKE Setting IPsec VPN IKE Policy IKE1IPsec Setting  IPsec Proposal IPsec Policy PFS DH1Pptp VPN Setting  IP Address Pool L2TP/PPTP Tunnel  Group Network ManagementUser Group  UserApp Control  ViewEnable Bandwidth Control 11 App RulesBandwidth Control Rule LAN WAN1Scan and import the entries to ARP List Network SecurityLAN ARP Defense Set Attack Defense WAN ARP DefenseSet IP-MAC Binding Entry Manually Attack Defense 20 Attack Defense 145Traffic Monitoring StatisticsPage Appendix a Hardware Specifications Environmental and PhysicalAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb