52
Enhanced Wireless Router
sectionstable of contents 12345 789106
UsIng THE WEb-basEd adVanCEd UsER InTERfaCE Configuring the firewall
Your Router is equipped wit h a firewall that wi ll protect your net work
from a wide array of co mmon hacker atta cks including:
• IP Spoofing
• Land Attack Ping of De ath (PoD)
• Denial of Service (D oS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequent ly used to
attack networks� The se ports appea r to be “stealth” me aning that for
all intents and purpos es, they do not exis t to a would-be ha cker� You
can turn the firewall fu nction off if ne eded; however, it is re commended
that you leave the firewall enabled� Disabl ing the firewall pr otection will
not leave your network co mpletely vulnera ble to hacker atta cks, but it is
recommended that you l eave the firewall en abled�