User's Manual
IPv6 Su
With billi
o
fulfill the
that prov
i
any pres
e
without h
The WG
R
IPv4-bas
traffics
t
impleme
n
Secure
The den
applicati
o
server r
e
the othe
r
bandwid
t
The WG
R
emergin
g
and kee
p
pport for Io
o
ns of new Io
requirements
ides a unique
e
nt and futur
e
aving to work
R
-500 suppor
ed networks
t
hrough the
n
tations for Io
T
Firewall Pr
o
ial-of-service
o
n access. T
h
e
sources, or t
h
r
, volume-bas
e
t
h of the attac
k
R
-500 provid
e
g
malicious tr
a
p
s networking
T Networki
n
T devices en
t
of connectin
g
64-bit host I
D
e
communicat
around all of
ts both IPv6
a
to the full IP
v
IPv4 enviro
n
T
connectivit
y
o
tection
attacks (Do
S
h
ere are two
t
h
ose of inter
m
e
d attacks lik
e
k
ed site.
e
s firewall to
p
a
ffic before at
t
more secure.
n
g
t
ering the ma
r
g
all the IoT
p
D
to every pre
s
ion device. T
h
the traditional
a
nd IPv4 to e
n
v
6 infrastruct
u
n
ment. The
W
y
.
S
) attempt to
t
ypes of DoS
m
ediate comm
e
UDP/ICMP
f
p
rotect IoT de
v
t
acks can oc
c
7
r
ket each yea
p
roducts toget
s
ent and futur
e
h
at means IP
v
l
NAT and fire
w
n
sure industri
u
re. It assign
s
W
GR-500 s
u
consume re
attacks – S
Y
unication equ
floods and ot
v
ices against
n
c
ur. With fire
w
r, IPv4 is fac
e
her. IPv6 offe
e
IoT device.
I
v
6 allows IoT
w
all issues.
al Ethernet w
s
IPv6 addre
s
u
pports IPv4
sources and
Y
N floods an
d
ipment, such
h
er spoofed-
p
n
etworking at
t
all protection,
User’s
M
e
d with the is
s
r
s a highly-sc
a
I
t is sufficient
t
products to b
e
i
th a smooth
m
s
ses to client
s
tunneling (
6
therefore de
d
ping of dea
t
as firewalls a
p
acket floods
t
t
ack like deni
a
it prevents I
o
M
anua
l
of
W
s
ue of not bei
n
alable addre
s
t
o address th
e
e uniquely a
d
m
igration pat
h
s
and passe
s
6
to4 transitio
e
ny users ne
t
t
h that consu
a
nd load bala
n
that would s
a
a
l-of-service (
D
o
T network fr
o
W
GR-500
n
g able to
s
s scheme
e
needs of
dressable
h
from the
s
the IPv6
n tunnel)
t
work and
m
e actual
n
cers, and
a
turate the
D
oS), and
o
m threats