Access Control - ActionTec Broadband Router RI408 User Manual

Actiontec electronics broadband router user manual
Hide thumbs Also See for Broadband Router RI408:
Table of Contents

Advertisement

2. Check the "Block
mon type of hacker attack that uses fragmented data packets to sabotage the
network. Note that
mate use of
IP
network to use these services.
3. Click Apply to save changes.

Access Control

Access control is used to block specific computers within the local network (or even
the whole network) from accessing certain services on the Internet. For example,
one computer can be prohibited from surfing the Internet, another computer from
transferring files using
Access control defines restrictions on the types of requests that can pass from the
local network out to the Internet, and thus may block traffic flowing in both direc-
tions. In the E-mail example given above, computers in the local network can be
prevented from receiving E-mail by blocking their outgoing requests to
ers on the Internet.
Access control also incorporates a list of preset services in the form of applications
and common port settings.
Chapter 5 Configuring the Router's Security
Fragments" box to protect the local network from a com-
IP
over
VPN
IPS
fragments.
fragments must be allowed to pass into the local
IP
, and the whole network from receiving incoming E-mail.
FTP
ec and some
-based services make legiti-
UDP
49
3 serv-
POP

Advertisement

Table of Contents
loading

Table of Contents