Belkin PM01110EA User Manual
Page 67
Advertising

65
g Wireless router
sections
table of contents
1
2
3
4
5
7
8
9
10
6
Using the Web-based advanced User interface
7. Check the box that says “enable ONlY specific Access Points
to connect”�
8. in the fields named “AP1”, type in the MAC address of your
secondary Access Point� When you have typed in the address, click
“Apply Changes”�
9. Bridging is now set up�
Configuring the Firewall
Your router is equipped with a firewall that will protect your network from
a wide array of common hacker attacks including:
•
iP spoofing
•
sYN flood
•
land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of service (Dos)
•
iCMP defect
•
iP with zero length
•
riP defect
•
smurf Attack
•
Fragment flooding
•
TCP Null scan
Advertising