Configuring the Wireless Barricade g Router
For a full list of ports and the services that run on them, see
Firewall
The Router firewall can provide access control of connected client PCs, block common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network users.
Access Control
Using this option allows you to specify different privileges based on IP address for the client PCs.
Note: Click on Add PC and define the appropriate settings for client PC services (as shown in the following screen).
50