User's Manual

R-300NP
48
this item.
Interface: WAN/LAN, WAN, LAN
Block TCP Flags
Scan
Enable
WAN/LAN
Any TCP packet with anomaly flag setting will be
dropped if you enable this item. Those scanning
activities include no flag scan, FIN without ACK scan,
SYN FIN scan, Xmas scan and full Xmas scan.
Interface: WAN/LAN, WAN, LAN
Block SYN Flood
Attack
Enable
50 packets/ per sec
WAN/LAN
Enable the SYN flood defense function to prevent the
TCP SYN packets’ attempt to exhaust the
limited-resource of R-300NP. Once the TCP SYN
packets exceeded the defined value, the R-300NP will
start to discard the subsequent TCP SYN packets.
Interface: WAN/LAN, WAN, LAN
Block UDP Flood
And Fraggle
Attack
Enable
50 packets/ per sec
WAN/LAN
Once the UDP packets exceeded the defined value,
the R-300NP will start to discard the subsequent UDP
packets.
Interface: WAN/LAN, WAN, LAN
Block ICMP Flood
Attack And Smurf
Attack
Enable
50 packets/ per sec
WAN/LAN
Similar to the UDP flood defense function, once the
thresholds of ICMP packets have exceeded the
defined value, the R-300NP will discard the ICMP echo
requests coming from the Internet.
And R-300NP will also ignore any broadcasting ICMP
echo request.
Interface: WAN/LAN, WAN, LAN
Port Scan Defence
Enable
WAN/LAN
Enables/disables R-300NP from responding to
Internet based port scans. This feature is designed to
protect your private local network from Internet based
hackers who attempt to gain unsolicited access your
network by detecting open IP ports on R-300NP.
Interface: WAN/LAN, WAN, LAN