Belkin F5D7630-4B, F5D7630-4A user manual Firewall, Understanding The Web-Based User Interface

Models: F5D7630-4B F5D7630-4A

1 68
Download 68 pages 40.81 Kb
Page 35
Image 35
4.Firewall

UNDERSTANDING THE WEB-BASED USER INTERFACE

Note to Mac users: Original Apple AirPort products support 64-bit encryption only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check your product to see which version you are using. If you cannot configure your network with 128-bit encryption, try 64-bit encryption.

4.Firewall

Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:

IP Spoofing

Land Attack

Ping of Death (PoD)

Denial of Service (DoS)

IP with zero length

Smurf Attack

TCP Null Scan

SYN flood

UDP flooding

Tear Drop Attack

ICMP defect

RIP defect

Fragment flooding

The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that essentially they do not exist to a would-be hacker. You can turn the firewall function off if needed, however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled.

33

Page 35
Image 35
Belkin F5D7630-4B, F5D7630-4A user manual Firewall, Understanding The Web-Based User Interface