Manually Configuring your Router
1Wireless channels must match between Router and AP.
2Security settings (WEP) must match between Router and AP.
3If MAC filtering is enabled, user must be sure to add the WLAN MAC address(es) of the Router/AP in order to allow communication with each other.
4If using a network protected by WPA, the SSID on both Access Points must be the same.
Firewall
Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:
• | IP Spoofing | • | SYN flood |
• | Land Attack | • | UDP flooding |
• Ping of Death (PoD) | • | Tear Drop Attack | |
• Denial of Service (DoS) | • | ICMP defect | |
• IP with zero length | • | RIP defect | |
• | Smurf Attack | • | Fragment flooding |
•TCP Null Scan
The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that essentially they do not exist to a
52