Using the Web-based advanced User interface
sections
table of contents
7.
Check the box that says "enable ONlY specific Access Points
to connect"�
8.
in the fields named "AP1", type in the MAC address of your
secondary Access Point� When you have typed in the address, click
"Apply Changes"�
9.
Bridging is now set up�
g Wireless router
1
2
3
4
5
6
Configuring the Firewall
Your router is equipped with a firewall that will protect your network from
a wide array of common hacker attacks including:
•
iP spoofing
•
sYN flood
•
land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of service (Dos)
•
iCMP defect
iP with zero length
•
•
riP defect
•
smurf Attack
•
Fragment flooding
•
TCP Null scan
65
7
8
9
10