The Security Tab - Firewall; Figure 6-24: Security Tab - Firewall - Linksys WRT54GS User Manual

2.4ghz wireless-g broadband router with speedbooster
Hide thumbs Also See for WRT54GS:
Table of Contents

Advertisement

Wireless-G Broadband Router with SpeedBooster

The Security Tab - Firewall

Firewall Protection. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of
data packets entering your network environment.
Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous
Internet Requests and you can prevent your network from being "pinged," or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests.
Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select Enabled to filter multicasting, or Disabled to disable this feature.
Filter Internet NAT Redirection. This feature uses port forwarding to block access to local servers from local
networked computers. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature.
Filter IDENT (Port 113). This feature keeps port 113 from being scanned by devices outside of your local
network. Select Enabled to filter port 113, or Disabled to disable this feature.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Chapter 6: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall

Figure 6-24: Security Tab - Firewall

firewall: a set of related programs located at a
network gateway server that protects the resources
of a network from users from other networks.
47

Advertisement

Table of Contents
loading

Table of Contents