
The Router supports RIP
v1 and RIP v2 used to
share routing tables with
other Layer 3 routing
devices on your local
network or remote LAN.
Null Scan attack
SYN/RST attack
SYN/FIN Scan
DNS from WAN
IKE from WAN
RIP from WAN
DHCP from WAN
A DoS "denial-of-service" attack is characterized by an explicit attempt by attackers to
prevent legitimate users of a service from using that service. Examples include:
attempts to "flood" a network, thereby preventing legitimate network traffic, attempts to
disrupt connections between two machines, thereby preventing access to a service,
attempts to prevent a particular individual from accessing a service, or, attempts to
disrupt service to a specific system or person.
Port scan protection is designed to block attempts to discover vulnerable ports or
services that might be exploited in an attack from the WAN.
The Service Filtering options allow you to block FTP, Telnet response, Pings, etc, from
the external network. Check the category you want to block to enable filtering of that
type of packet.
When you have selected the desired Firewall policies, click the
Apply
button to enforce
the policies. Remember to save any configuration changes.
RIP Dynamic Routing
Advanced > RIP
Dynamic Routing (RIP) menu
To enable RIP, select Enabled from the RIP pull-down menu, select the Protocol
(RIPv1 and RIPv1 Compatible) and
Direction
(In, Out, or Both), and click
Apply
.
The RIPv1 Compatible option will transmit RIPv2 broadcast packets and receive both
RIP v1 and RIP v2 packets.
The direction configuration refers to the RIP request. Select In to allow RIP requests
from other devices. Select Out to instruct the Router to make RIP requests for routing
Comentários a estes Manuais