C
ONFIGURING
THE
B
ARRICADE
4-38
Note:
Most modern routers support RIP-2 so there is usually no need for
a static route table.
Firewall
The Barricade’s firewall enables access control of client PCs, blocks
common hacker attacks, including IP Spoofing, Land Attack, Ping of
Death, IP with zero length, Smurf Attack, UDP port loopback, Snork
Attack, TCP null scan, and TCP SYN flooding. The firewall does not
significantly affect system performance and we advise leaving it enabled to
protect your network.
Note:
When you check a radio button in the “Enable or disable Firewall
module function” field, be sure to click the “APPLY” button.
Содержание 7404WBRA
Страница 2: ......
Страница 10: ...COMPLIANCES vi ...
Страница 14: ...TABLE OF CONTENTS x ...
Страница 26: ...INSTALLATION 2 8 ...
Страница 28: ...CONFIGURING CLIENT PCS 3 2 ...
Страница 57: ...WIRELESS 4 29 MAC Address Filtering ...
Страница 60: ...CONFIGURING THE BARRICADE 4 32 Virtual Server ...
Страница 67: ...FIREWALL 4 39 Access Control ...
Страница 69: ...FIREWALL 4 41 Access Control Add PC ...
Страница 72: ...CONFIGURING THE BARRICADE 4 44 3 Click OK and then click APPLY to save your settings ...
Страница 73: ...FIREWALL 4 45 Intrusion Detection ...
Страница 82: ...CONFIGURING THE BARRICADE 4 54 Status ...
Страница 90: ...CONFIGURING THE BARRICADE 4 62 ...
Страница 114: ...CONFIGURING CLIENT TCP IP 5 24 ...
Страница 132: ...CABLES B 6 ...
Страница 135: ......