Rosewill RNX-N400LX user manual Management - Denial-of-Service

Page 49
3.75 Management – Denial-of-Service

Wireless RouterRNX-N400LX

User Manual

 

 

 

 

 

 

3.75 Management – Denial-of-Service

A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. You can use this part to enable and setup protection to prevent attack by hacker’s program. This provides more security for users.

Item

Description

Enable DoS

Click the checkbox to enable DoS prevention

Prevention

 

Whole System

 

Flood /

Enable and setup prevention in details.

Per-Source IP

 

Flood…

 

Select ALL

Click the checkbox to enable all prevention items.

Clear ALL

Click the checkbox to disable all prevention items.

Apply Changes

Click the Apply Changes button to complete the new configuration

setting.

 

49

Image 49
Contents Wireless Router RNX-N400LX Default IP Address Default Login Name admin Default Password guestUser Manual Safety Warning Wireless RouterRNX-N400LXUser Manual Table of Contents3.53 Firewall - MAC Filtering Before We Begin 1 Introduction 1.2 Key Features1.1 Overview Advantages1.4 Product Layout and LED Signal 1.3 Package ContentsStatus DescriptionSMA Antenna Connector Port/Connector/ButtonReset WPS Button1.7 Hardware Setup 1.6 RNX-N400LX Placement1.5 Network + System Requirements RNX-N400LX and Modem Rear View 2.1 Prepare your PC for RNX-N400LX’s configuration 2 Setup2.11 For OS of Microsoft Windows User Manual 2.12 For OS of Microsoft Windows Vista 2.13 For OS of Microsoft Windows 2000/ XP 2.15 For OS of Microsoft Windows NT 2.14 For OS of Microsoft Windows 95/ 98/ Me2.21 Connecting using Web Browser 2.2 Connecting to RNX-N400LX’s Web Management3.11 Welcome to Setup Wizard 3.1 Setup Wizard3 RNX-N400LX Web Management page 3.14 LAN Interface Setup 3.13 Time Zone Setting3.12 Operation Mode 3.16 Wireless Basic Setting 3.15 WAN Interface Setup3.2 Operation Mode 3.17 Wireless Security SetupDescription Gateway3.31 Wireless Basic Settings 3.3 WirelessSSID 3.32 Wireless - Advanced SettingChannel Width SidebandShort GI Encryption 3.33 Wireless - Security SetupFormat Hex 64 characters. WPA, PersonalPre-Shared Key onlyClick the Disabled, Allow Listed or Deny Listed of drop down 3.34 Wireless - Access ControlRequirement Set Wireless-Basic Settings-Mode-AP+WDS 3.35 Wireless - WDS SettingsThis page is used to configure the wireless security between APs This section will show you the WDS Statistics 3.36 Wireless - Site SurveySignal 3.37 Wireless - WPSShow WPS status is Configured or Un-Configured Encrypt3.38 Wireless - Schedule 3.4 TCP/IP Settings3.41 LAN Interface Configurationmenu. Server mode only 3.411 Static DHCP SetupServer mode only 3.421 WAN Interface Setup - Static IP 3.42 WAN Interface SetupDescription 3.422 WAN Interface Setup - DHCP client Automatically 3.423 WAN Interface Setup - PPPoEManually Service Name PasswordPPPoE User Name3.424 WAN Interface Setup - PPTP PPTP Enable Dynamic3.51 Firewall - Port Filtering 3.5 Firewall3.52 Firewall - IP Filtering 3.53 Firewall - MAC Filtering 3.54 Firewall - Port Forwarding Forwarding 3.55 Firewall - URL Filtering3.56 Firewall - DMZ 3.6 QoS 3.71 Management - Status 3.7 ManagementSystem Wireless configurationFirmware 3.73 Management - DDNS 3.72 Management - StatisticsDefault Gateway Subnet Mask3.74 Management - Time Zone Setting 3.75 Management - Denial-of-Service 3.76 Management - Log 3.77 Management - Upgrade Firmware3.79 Management - Password 3.78 Management - Save/Reload SettingsEmpty user name and password will disable the protection 1. What is and how to find my Computer’s IP and MAC address? Appendix A - FREQUENTLY ASKED QUESTIONS FAQ4. How does wireless networking work? 2. What is Wireless LAN?3. What are ISM bands? Example 1 wireless Infrastructure Mode 5. What is BSSID?Example 2 wireless Ad Hoc Mode 8. What are the Open System and Shared Key authentications? 6. What is ESSID?9. What is WEP? 7. What are potential factors that may causes interference?11. What is RTS Request to Send Threshold? 10. What is Fragment Threshold?13. What is Preamble Type? 12. What is Beacon Interval?14. What is SSID Broadcast? 15. What is Wi-Fi Protected Access WPA?17. What is 802.1x Authentication? Protocol TKIP? 16. What is WPA2?18. What is Temporal Key Integrity Protocol TKIP? 19. What is Advanced Encryption Standard AES?21. What is Wireless Distribution System WDS? 20. What is Inter-Access Point Protocol IAPP?22. What is Universal Plug and Play UPnP? 23. What is Maximum Transmission Unit MTU Size?26. What is NTP Client? 25. What is DDNS?27. What is VPN? 28. What is IPSEC?32. What is Modulation Coding Scheme MCS? 31. What is WLAN ACK TIMEOUT?33. What is Frame Aggregation? 34. What is Guard Intervals GI?Appendix B Hardware Feature Dimensions L W x HWireless Router RNX-N400LX Federal Communication Commission Interference Statement Appendix C - FCC Interference StatementIMPORTANT NOTE FCC Radiation Exposure Statement Italian Industry Canada statement Appendix D - IC Interference Statement