User's Manual
Table Of Contents
- Chapter I: Product Information
- Chapter II: System and Network Setup
- 2-1 Build network connection
- 2-2 Connecting to wireless broadband router by web browser
- 2-3 Using ‘Quick Setup’
- 2-4 Basic Setup
- 2-5 Setup Internet Connection (WAN Setup)
- 2-5-1 Setup procedure for ‘Dynamic IP’:
- 2-5-2 Setup procedure for ‘Static IP’:
- 2-5-3 Setup procedure for ‘PPPoE’:
- 2-5-4 Setup procedure for ‘PPTP’:
- 2-5-5 Setup procedure for ‘L2TP’:
- 2-5-6 Setup procedure for ‘Telstra Big Pond’:
- 2-5-7 Setup procedure for ‘DNS’:
- 2-5-8 Setup procedure for ‘DDNS’:
- 2-5-9 Setup procedure for ‘WISP’:
- 2-6 Wired LAN Configurations
- 2-7 Wireless LAN Configurations
- 2-7-1 Basic Wireless Settings
- 2-7-1-1 Setup procedure for ‘Access Point’:
- 2-7-1-2 Setup procedure for ‘Station-Infrastructure’:
- 2-7-1-3 Setup procedure for ‘AP Bridge-Point to Point’:
- 2-7-1-4 Setup procedure for ‘AP Bridge-Point to Multi-Point’:
- 2-7-1-5 Setup procedure for ‘AP Bridge – WDS’
- 2-7-1-6 Setup procedure for ‘Universal Repeater’
- 2-7-2 Advanced Wireless Settings
- 2-7-3 Wireless Security
- 2-7-4 Wireless Access Control
- 2-7-5 Wi-Fi Protected Setup (WPS)
- 2-7-6 Security Tips for Wireless Network
- 2-7-1 Basic Wireless Settings
- Chapter III Advanced Functions
- Chapter IV: Appendix
131
3-3-3-1 DoS - Advanced Settings
When you click ‘Advanced’ button in DoS menu, the following message
will be displayed on your web browser:
Here are descriptions of every setup items:
Ping of Death (a): Set the threshold of when this DoS prevention
mechanism will be activated. Please check the box
of Ping of Death, and input the frequency of
threshold (how many packets per second, minute, or
hour), you can also input the ‘Burst’ value, which
means when this number of ‘Ping of Death’ packet
is received in very short time, this DoS prevention
mechanism will be activated.
Discard Ping Check the box to activate this DoS
From WAN (b): prevention mechanism.
Port Scan (c): Many kind of port scan methods are listed here,
please check one or more DoS attack methods you
want to prevent.
a
b
c
d
e










