UsInG THe Web-based adVanCed UseR InTeRfaCe
sections
table of contents
Configuring the firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
•
IP Spoofing
•
SYN flood
•
Land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of Service (DoS)
•
ICMP defect
•
IP with zero length
•
RIP defect
•
Smurf Attack
•
Fragment flooding
•
TCP Null Scan
Wireless G Router
1
2
3
4
5
6
The firewall also masks common ports that are frequently used to
attack networks� These ports appear to be "Stealth", meaning that for
all intents and purposes, they do not exist to a would-be hacker� You
can turn the firewall function off if needed; however, while disabling the
firewall protection will not leave your network completely vulnerable to
hacker attacks, it is recommended that you leave the firewall enabled�
60
7
8
9
10