
64
Using the Web-Based Advanced User Interface
65
64
Configuring the Firewall
Your N1 Vision is equipped with a firewall that will protect your
network from a wide array of common hacker attacks including:
•
IP Spoofing
•
Land Attack Ping of Death (PoD)
•
Denial of Service (DoS)
•
IP with zero length
•
Smurf Attack
•
TCP Null Scan
•
SYN flood
•
UDP flooding
•
Tear Drop Attack
•
ICMP defect
•
RIP defect
•
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks . These ports appear to be “stealth” meaning that
for all intents and purposes, they do not exist to a would-be hacker .
Disabling the firewall protection will not leave your network completely
vulnerable to hacker attacks, but it is recommended that you leave the
firewall enabled .
Summary of Contents for F5D8232-4
Page 1: ...User Manual...
Page 2: ......
Page 4: ......