52
Double N+ Wireless Rout er
sections
table of contents 12345 789106
UsINg THe Web-baseD aDVaNCeD UseR INTeRfaCe
Configuring the firewall
Your Router is equipped wit h a firewall that wi ll protect your net work
from a wide array of co mmon hacker atta cks including:
• IPSpoofing
• LandAttackPingofDe ath(PoD)
• DenialofService(D oS)
• IPwithzerolength
• SmurfAttack
• TCPNullScan
• SYNflood
• UDPflooding
• TearDropAttack
• ICMPdefect
• RIPdefect
• Fragmentflooding
The firewall also masks common ports that are frequent ly used to
attack networks. The se ports appea r to be “stealth” me aning that for
all intents and purpos es, they do not exis t to a would-be ha cker. You
can turn the firewall fu nction off if ne eded; however, it is rec ommended
that you leave the firewall enabled. Disabl ing the firewall pr otection will
not leave your network co mpletely vulnera ble to hacker atta cks, but it is
recommended that you l eave the firewall en abled.