Using the Web-Based Advanced User Interface

Table of Contents

sections

1

2

3

4

5

6

7

8

9

10

7.Check the box that says “Enable ONLY specific Access Points to connect”.

8.In the fields named “AP1”, type in the MAC address of your secondary Access Point. When you have typed in the address, click “Apply Changes”.

9.Bridging is now set up.

Configuring the Firewall

Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:

IP Spoofing

SYN flood

Land Attack

UDP flooding

Ping of Death (PoD)

Tear Drop Attack

Denial of Service (DoS)

ICMP defect

IP with zero length

RIP defect

Smurf Attack

Fragment flooding

TCP Null Scan

G Wireless Router

65

Page 67
Image 67
Belkin PM01110EA user manual Configuring the Firewall