Chapter 3 Configuration
-IP Spoofing
-Ping of Death (Length > 65535)
-Land Attack (Same source / destination IP address)
-IP with zero length
-Sync flooding
-Smurf Attack (ICMP Echo with x.x.x.0 or x.x.x.255)
-Snork Attack
-UDP port
-TCP NULL scan
Block WAN Request/URL Filter
Check “Enable” if you want to exclude outside PING from reaching on this router.
31