Operation Manual

Vigor2100V/VG Series of Residential Broadband Routers
x
5.4. DMZ Host Setup ................................................................................ 5-5
5.5. Open Port Setup................................................................................. 5-7
5.6. Well-known Port Number List .......................................................... 5-9
CHAPTER 6. Protect Your Network
6.1. Introduction........................................................................................ 6-1
6.2. An Overview of the IP Filter/Firewall ............................................... 6-1
6.3. General Setup..................................................................................... 6-5
6.4. Editing the Filter Sets ........................................................................ 6-7
6.5. Editing the Filter Rules...................................................................... 6-7
6.6. An Example of Restricting Unauthorized Internet Services............6-11
Chapter 6-A. Prevention of Denial of Service Attacks
6.A.1. Introduction.................................................................................. 6-13
An Overview of DoS Defense Functionality......................................... 6-13
6.A.2. Configuration ............................................................................... 6-14
6.A.3. Warning Message ......................................................................... 6-19
Chapter 6-B. URL Content Filtering
6.B.1. Introduction .................................................................................. 6-21
6.B.2. An Overview of URL Content Filtering....................................... 6-22
6.B.3. Configuration................................................................................ 6-22
6.B.4. Warning Message.......................................................................... 6-29
CHAPTER 7. Dynamic DNS Setup
7.1. Introduction........................................................................................ 7-1
7.2. Configuration ..................................................................................... 7-2
7.3. Validation and Troubleshooting......................................................... 7-3