Intrusion:  | Detects 11 types of denial of service (DOS) attacks including:  | 
  | ping of death (illegal ping packet), SYN flood (detects if SYN  | 
  | is from the same source), LAND attack (same source and  | 
  | destination addresses), IP spoofing (simulates a LAN  | 
  | packet), Code Red 1 (pattern I), Code Red II (pattern II), UDP  | 
  | loopback (illegal UDP echo), smurf attack (ping with destina-  | 
  | tion address as broadcast), snork attack (same source and  | 
  | destination port), TCP null scan (SYN packets with sequence  | 
  | = 0) and zero length IP option (illegal ICMP IP fragment).  | 
  | Detects, logs and reports all suspicious activities.  | 
Access Control:  | Limits wireless LAN traffic only to registered computers with  | 
  | specified hardware (MAC) address  | 
Business Controls:  | Blocks access to certain websites (URL)  | 
Applications Interoperability | 
  | 
Microsoft:  | Universal   | 
Apple:  | AppleTalk and QuickTime.  | 
Messaging:  | H.323, AOL Instant Messenger, ICQ and MIRC  | 
Others:  | RealPlayer, Dialpad, Quake,   | 
Tournament  | 
  | 
Standards Compliance | 
  | 
Network:  | IEEE 802.3u Fast Ethernet over 2 pairs of UTP Category 5  | 
  | (100BaseTX)  | 
  | IEEE 802.3 Ethernet over 2 pairs of UTP Category 3  | 
  | (10BaseT)  | 
  | VR2004AC: IEEE 802.11b Wireless Ethernet over 2.4GHz  | 
VPN Encryption:  | NULL,   | 
Triple DES (3DES)  | 
  | 
Wireless Encryption:  | VR2004AC: 64- and   | 
Authentication:  | IP Authentication Header (AH), MD5 (RFC 1321),   | 
secure hash algorithm (NIS94c)  | 
  | 
Password:  | Password authentication protocols PAP, CHAP (RFC 1334)  | 
and MSCHAP  | 
  | 
Key Management:  | Internet Key Exchange (IKE, RFC2409) incorporating  | 
ISAKMP, Oakley, and Skeme  | IP Encapsulating Security Payload (ESP, RFC 1827)  | 
  | |
Routing:  | Routing information protocols RIP 1 (RFC 1058), RIP Version  | 
2 (RFC 1721)  | 
  | 
Translation:  | Network Address Translation (NAT, RFC 1631)  | 
Transmission:  | Point to Point Protocol over Ethernet (PPPoE, RFC 2516)  | 
  | and Point to Point Tunneling Protocol (PPTP)  | 
User’s Manual  | 67  | 
  |