Using the Web-based advanced User interface
sections
table of contents
Configuring the Firewall
Your router is equipped with a firewall that will protect your network from
a wide array of common hacker attacks including:
•
iP spoofing
•
sYN flood
•
land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of service (Dos)
•
iCMP defect
iP with zero length
•
•
riP defect
•
smurf Attack
•
Fragment flooding
•
TCP Null scan
g Wireless router
1
2
3
4
5
6
61
7
8
9
10