50
N Wireless Router
sections
table of contents
1
2
3
4
5
7
8
9
10
6
UsINg THe Web-based adVaNCed UseR INTeRfaCe
setting up a deny access list
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be allowed
access to the wireless network. All others will.
1�
Select the “Deny” radio button (b) to begin setting up a list of
computers to be denied access to the wireless network.
2�
Next, in the “MAC Address” field that is blank (c), type in the
MAC address of the wireless computer you want to deny
access to the wireless network, then click “<<Add” (d).
(a)
(c)
(e)
(d)
(b)
Configuring the firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
•
IP Spoofing
•
Land Attack Ping of Death (PoD)
•
Denial of Service (DoS)
•
IP with zero length
•
Smurf Attack
•
TCP Null Scan
•
SYN flood
•
UDP flooding
•
Tear Drop Attack
•
ICMP defect
•
RIP defect
•
Fragment flooding
3�
Continue to do this until all of the computers you want to deny
access to have been entered.
4�
Click “Apply Changes” (e) to finish.