Understanding the web-based user interface – Belkin F5D7630-4A User Manual

Page 35

Advertising
background image

33

UNDERSTANDING THE WEB-BASED USER INTERFACE

Note to Mac users: Original Apple AirPort products support 64-bit encryption only.
Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check
your product to see which version you are using. If you cannot configure your
network with 128-bit encryption, try 64-bit encryption.

4. Firewall

Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:

• IP Spoofing

• Land Attack

• Ping of Death (PoD)

• Denial of Service (DoS)

• IP with zero length

• Smurf Attack

• TCP Null Scan

• SYN flood

• UDP flooding

• Tear Drop Attack

• ICMP defect

• RIP defect

• Fragment flooding

The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth”, meaning that essentially they do
not exist to a would-be hacker. You can turn the firewall function off if needed,
however, it is recommended that you leave the firewall enabled. Disabling the
firewall protection will not leave your network completely vulnerable to hacker
attacks, but it is recommended that you leave the firewall enabled.

Advertising
This manual is related to the following products: