Using the Web-Based Advanced User Interface
Table of Contents | sections | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
WAN Ping Blocking |
|
|
|
|
| Utilities Tab |
|
|
|
|
|
Computer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the level of security of your Router.
This screen lets you manage different parameters of the Router and perform certain administrative functions.
To turn off the ping response, select “Block ICMP Ping” and click “Apply Changes”. The Router will not respond to an ICMP ping.
G Wireless Router | 65 |