802.11 Standards-Based Wireless Networking; A Powerful, True Firewall; Content Filtering - NETGEAR MBR814X Reference Manual

Mobile broadband router
Table of Contents

Advertisement

Reference Manual for the Mobile Broadband Router MBR814X
Extensive Internet protocol support.
A card slot with PC card for wireless broadband access.
These features are discussed below.

802.11 Standards-based Wireless Networking

The MBR814X router includes an 802.11 g-compliant wireless access point, providing continuous,
high-speed 10/100 Mbps access between your wireless and Ethernet devices. The access point
provides:
802.11 g Standards-based wireless networking at up to 100 Mbps.
Works with both 802.11g and 802.11b wireless devices.
64-bit and 128-bit WEP encryption security.
WEP keys can be entered manually or generated by passphrase.
Support for the Wi-FI Protected Pre-Shared Key (WPA-PSK) encryption.
Wireless access can be restricted by MAC address.

A Powerful, True Firewall

Unlike simple Internet sharing NAT routers, the MBR814X is a true firewall, using stateful packet
inspection to defend against hacker attacks. Its firewall features include:
Denial of Service (DoS) protection
Automatically detects and thwarts Denial of Service (DoS) attacks such as Ping of Death,
SYN Flood, LAND Attack and IP Spoofing.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Logs security incidents
The MBR814X will log security events such as blocked incoming traffic, port scans, attacks,
and administrator logins. You can configure the router to email the log to you at specified
intervals. You can also configure the router to send immediate alert messages to your email
address or email pager whenever a significant event occurs.

Content Filtering

With its content filtering feature, the MBR814X prevents objectionable content from reaching your
computers. The router allows you to control access to Internet content by screening for keywords
within Web addresses. You can configure the router to log and report attempts to access
objectionable Internet sites.
2-2
v1.0, January 2006

Advertisement

Table of Contents
loading

Table of Contents