![Compex WP54G 1a User Manual Download Page 137](http://html1.mh-extra.com/html/compex/wp54g-1a/wp54g-1a_user-manual_2647105137.webp)
Security Configuration
126
F
F
I
I
R
R
E
E
W
W
A
A
L
L
L
L
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
A
A
T
T
I
I
O
O
N
N
More than just a “NAT” firewall, there is a powerful Stateful Packet Inspection
(SPI) firewall option that can be activated on the access point. Stateful
inspection compares certain key parts of the packet to a database of trusted
information before allowing it through. Common hacker attacks like IP
Spoofing, Port Scanning, Ping of Death and SynFlood can be easily thwarted
with Compex’s SPI firewall.
To learn more about SPI firewall, read our whitepaper at
www.cpx.com
or at
www.compex.com.sg
.
T
T
O
O
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
E
E
S
S
P
P
I
I
F
F
I
I
R
R
E
E
W
W
A
A
L
L
L
L
T
he following steps explain the configuration of Compex’s SPI firewall. As
incorrect configuration to the firewall can result in undesirable network
behavior, you are advised to carefully plan your firewall security rules.
Step 1:
Under the
S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y
C
C
o
o
n
n
f
f
i
i
g
g
u
u
r
r
a
a
t
t
i
i
o
o
n
n
command menu, click on
F
F
i
i
r
r
e
e
w
w
a
a
l
l
l
l
C
C
o
o
n
n
f
f
i
i
g
g
u
u
r
r
a
a
t
t
i
i
o
o
n
n
.
Step 2:
First, enable the firewall. You can
choose among the
D
D
e
e
f
f
a
a
u
u
l
l
t
t
L
L
o
o
w
w
,
D
D
e
e
f
f
a
a
u
u
l
l
t
t
M
M
e
e
d
d
i
i
u
u
m
m
or
D
D
e
e
f
f
a
a
u
u
l
l
t
t
H
H
i
i
g
g
h
h
security options for convenient setup.
Step 3:
Then you may choose the type of
network activity information you wish
to log for reference. Data activity
arising from different types of
Summary of Contents for WP54G 1a
Page 1: ......
Page 130: ...Advanced Configuration 119...