RCA DCW615A Quick Manual page 8

Cable router
Table of Contents

Advertisement

Ø OverDrop
Ø BONK, BOINK
Ø Blind Spoofing
Ø Echo/Chargen
Ø Storm
Ø Smurf Attack
Ø Mime Flood
l De-Militarized Zone (DMZ) which allows a computer on the LAN to expose all of its ports to the
WAN that are not otherwise filtered
l Logged Events which all security incidents will be logged
l Keyword blocking is based on keywords in a URL and can be specified by the user
NAT Requirements
The implementation of NAT must allow for specific port redirection. Listed below are applications
supported.
Ø FTP
Ø IRC
Ø H.323
Ø Quake
Ø Blizzard games
Ø Chat ALG
5

Advertisement

Table of Contents
loading

Table of Contents