C
ONFIGURING
THE
B
ARRICADE
4-38
Note:
Most modern routers support RIP-2 so there is usually no need for
a static route table.
Firewall
The Barricade’s firewall enables access control of client PCs, blocks
common hacker attacks, including IP Spoofing, Land Attack, Ping of
Death, IP with zero length, Smurf Attack, UDP port loopback, Snork
Attack, TCP null scan, and TCP SYN flooding. The firewall does not
significantly affect system performance and we advise leaving it enabled to
protect your network.
Note:
When you check a radio button in the “Enable or disable Firewall
module function” field, be sure to click the “APPLY” button.
Summary of Contents for 7404WBRA
Page 2: ......
Page 10: ...COMPLIANCES vi ...
Page 14: ...TABLE OF CONTENTS x ...
Page 26: ...INSTALLATION 2 8 ...
Page 28: ...CONFIGURING CLIENT PCS 3 2 ...
Page 57: ...WIRELESS 4 29 MAC Address Filtering ...
Page 60: ...CONFIGURING THE BARRICADE 4 32 Virtual Server ...
Page 67: ...FIREWALL 4 39 Access Control ...
Page 69: ...FIREWALL 4 41 Access Control Add PC ...
Page 72: ...CONFIGURING THE BARRICADE 4 44 3 Click OK and then click APPLY to save your settings ...
Page 73: ...FIREWALL 4 45 Intrusion Detection ...
Page 82: ...CONFIGURING THE BARRICADE 4 54 Status ...
Page 90: ...CONFIGURING THE BARRICADE 4 62 ...
Page 114: ...CONFIGURING CLIENT TCP IP 5 24 ...
Page 132: ...CABLES B 6 ...
Page 135: ......