Belkin F5D7234-4 - G Wireless Router Manual de usuario Pagina 62

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 105
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 61
60
G Wireless Router
SECTIONSTable of Contents 1 2 3 4 5 7 8 9 106
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
• IP Spoofing
• SYN flood
• Land Attack
• UDP flooding
• Ping of Death (PoD)
• Tear Drop Attack
• Denial of Service (DoS)
• ICMP defect
• IP with zero length
• RIP defect
• Smurf Attack
• Fragment flooding
• TCP Null Scan
The firewall also masks common ports that are frequently used to
attack networks� These ports appear to be “Stealth”, meaning that for
all intents and purposes, they do not exist to a would-be hacker� You
can turn the firewall function off if needed; however, while disabling the
firewall protection will not leave your network completely vulnerable to
hacker attacks, it is recommended that you leave the firewall enabled�
Vista de pagina 61
1 2 ... 57 58 59 60 61 62 63 64 65 66 67 ... 104 105

Comentarios a estos manuales

Sin comentarios