Belkin PM01110 User Manual
Page 66
Advertising

64
G Wireless Router
sections
table of contents
1
2
3
4
5
7
8
9
10
6
UsInG THe Web-based adVanCed UseR InTeRfaCe
7�
Check the box that says “Enable ONLY specific Access Points
to connect”�
8�
In the fields named “AP1”, type in the MAC address of your
secondary Access Point� When you have typed in the address,
click “Apply Changes”�
9�
Bridging is now set up�
Configuring the firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
•
IP Spoofing
•
SYN flood
•
Land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of Service (DoS)
•
ICMP defect
•
IP with zero length
•
RIP defect
•
Smurf Attack
•
Fragment flooding
•
TCP Null Scan
Advertising