
61
g Wireless router
sections
table of contents
1
2
3
4
5
7
8
9
10
6
Using the Web-based advanced User interface
Configuring the Firewall
Your router is equipped with a firewall that will protect your network from
a wide array of common hacker attacks including:
•
iP spoofing
•
sYN flood
•
land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of service (Dos)
•
iCMP defect
•
iP with zero length
•
riP defect
•
smurf Attack
•
Fragment flooding
•
TCP Null scan