![background image](http://html1.mh-extra.com/html/comtac/lp-3014pw/lp-3014pw_installation-manual-and-users-manual_2648374083.webp)
Wireless ADSL Modem User’s Manual 79
nodes in a network, making it easy to exploit any weakness. Enabling Source
Routing checking will cause the firewall to filter out any packet with Source
Routing properties.
•
WinNuke Attack checking:
WinNuke exploits a large networking bug found
in Windows 95 and NT. WinNuke sends erroneous OOB (Out-of-Band) data
that Windows is unable to process, causing the target computer to crash. Enable
this if you are running an early (95 or NT) version of Windows that is
vulnerable to this attack.
Hacker Log
This page allows you to configure which Protection Policy (see previous section)
violations to log for admin viewing.
Alert Log:
Enable/Disable for SYN Flooding, Ping of Death, IP Spoofing, and Win
Nuke (all of these are explained in the previous section). Enable to log violations of
individual policies.