Belkin PM01527ea F5D8636-4 Using the Web-Based Advanced User Interface, Configuring the Firewall

Models: PM01527ea F5D8636-4

1 100
Download 100 pages 36.73 Kb
Page 56
Image 56
Configuring the Firewall

Using the Web-Based Advanced User Interface

Table of Contents

sections

1

2

3

4

5

6

7

8

9

10

Configuring the Firewall

Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:

IP Spoofing

The firewall also masks common ports that are frequently used to

 

 

attack networks.. These ports appear to be “stealth” meaning that for

Land Attack Ping of Death (PoD)

all intents and purposes, they do not exist to a would-be hacker.. You

 

 

can turn the firewall function off if needed; however, it is recommended

Denial of Service (DoS)

that you leave the firewall enabled.. Disabling the firewall protection will

 

 

not leave your network completely vulnerable to hacker attacks, but it is

IP with zero length

recommended that you leave the firewall enabled..

Smurf Attack

TCP Null Scan

SYN flood

UDP flooding

Tear Drop Attack

ICMP defect

RIP defect

Fragment flooding

N Wireless Modem Router

54

Page 56
Image 56
Belkin PM01527ea F5D8636-4 user manual Using the Web-Based Advanced User Interface, Configuring the Firewall, sections