Wireless N450 Home Router
54
Note
1.
The
default
port
is
8080.
Do
not
change
it.
2.
To
access
the
router
via
port
8080,
enter
"http://x.x.x.x:8080"
where
"x.x.x.x"
represents
the
Internet
IP
address
of
the
router
and
8080
is
the
port
used
for
the
Web
‐
Management
interface.
Assuming
the
router's
Internet
IP
address
is
220.135.211.56,
then
simply
replace
the
"x.x.x.x"
with
"220.135.211.56"
(namely,
http://220.135.211.56:8080).
Leaving
the
IP
address
field
at
"0.0.0.0"
makes
the
router
remotely
accessible
to
all
the
PCs
on
the
Internet.
Entering
a
specific
IP
address,
such
as
218.88.93.33,
makes
the
router
only
remotely
accessible
to
the
PC
at
the
specified
IP
address.
5.5
DDOS
Defence
The
DDOS
Defence
feature
effectively
blocks
ICMP,
UDP,
and
SYN
flooding
attacks.
When
the
number
of
ICMP,
UDP,
or
SYN
packets
received
exceeds
the
defined
threshold,
the
router
will
record
its
IP
and
MAC
addresses
in
the
"DDOS
Defence
List".
●
ICMP
Flood:
If
an
IP
receives
the
number
of
ICMP
request
packets
that
exceeds
the
defined
limit
continuously
from
the
same
sender
within
one
second,
then
such
IP
is
considered
to
encounter
an
ICMP
Flood
attack.
●
UDP
Flood
:
If
an
IP
receives,
on
an
identical
port,
UDP
packets
exceeding
the
defined
limit
continuously
from
the
same
sender
within
a
second,
then
the
port
is
suffering
a
UDP
Flood
attack.
●
SYN
Flood:
If
an
IP
receives,
on
an
identical
port,
TCP
SYN
packets
exceeding
defined
limit
continuously
from
the
same
sender
within
a
second,
then
the
port
is
suffering
a
SYN
Flood
attack.
5.6
SPI
Firewall
Stateful
Packet
Inspection
(SPI)
helps
to
prevent
cyber
attacks
by
tracking
more
state
per
session.
It
validates
that
the
traffic
passing
through
the
session
conforms
to
the
protocol.