TP-Link AC3200 Archer C3200 V1 User Guide - Page 42

Network Security, 10. 1. Protect the Network from Cyber Attacks

Page 42 highlights

Network Security This chapter guides you on how to protect your home network from cyber attacks and unauthorized users by implementing these three network security functions. You can protect your home network against DoS (Denial of Service) attacks from flooding your network with server requests using DoS Protection, block or allow specific client devices to access your network using Access Control, or you can prevent ARP spoofing and ARP attacks using IP & MAC Binding function. This chapter contains the following sections: • Protect the Network from Cyber Attacks • Access Control • IP & MAC Binding 10 10. 1. Protect the Network from Cyber Attacks The SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection protect the router from cyber attacks. The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This function is enabled by default, and it's recommended to keep the default setting. DoS Protection can protect your home network against DoS attacks from flooding your network with server requests. Follow the steps below to configure DoS Protection. 1. Visit http://tplinkwifi.net, and log in with the username and password you set for the router. 2. Go to Advanced > Security > Settings. 3. Enable DoS Protection. 4. Set the level (Off, Low, Middle or High) of protection for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering and TCP-SYN-FLOOD Attack Filtering. • ICMP-FLOOD Attack Filtering - Enable to prevent the Internet Control Message Protocol (ICMP) flood attack. • UDP-FlOOD Attack Filtering - Enable to prevent the User Datagram Protocol (UDP) flood attack. • TCP-SYN-FLOOD Attack Filtering - Enable to prevent the Transmission Control Protocol-Synchronize (TCP-SYN) flood attack. Chapter 10 . Network Security 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

39
Chapter 10 °
Network Security
Network Security
This chapter guides you on how to protect your home network from cyber
attacks and unauthorized users by implementing these three network security
functions. You can protect your home network against DoS (Denial of Service)
attacks from flooding your network with server requests using DoS Protection,
block or allow specific client devices to access your network using Access
Control, or you can prevent ARP spoofing and ARP attacks using IP & MAC
Binding function.
This chapter contains the following sections:
Protect the Network from Cyber Attacks
Access Control
IP & MAC Binding
10. 1.
Protect the Network from Cyber Attacks
The SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection
protect the router from cyber attacks.
The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This
function is enabled by default, and it’s recommended to keep the default setting.
DoS Protection can protect your home network against DoS attacks from flooding your network with server requests. Follow
the steps below to configure DoS Protection.
1.
Visit
http://tplinkwifi.net
, and log in with the username and password you set for the router.
2.
Go to
Advanced
>
Security
>
Settings
.
3.
Enable
DoS Protection
.
4.
Set the level (
Off
,
Low
,
Middle
or
High
) of protection for
ICMP-FLOOD Attack Filtering
,
UDP-FlOOD Attack Filtering
and
TCP-SYN-FLOOD Attack Filtering
.
ICMP-FLOOD Attack Filtering
- Enable to prevent the Internet Control Message Protocol (ICMP) flood attack.
UDP-FlOOD Attack Filtering
- Enable to prevent the User Datagram Protocol (UDP) flood attack.
TCP-SYN-FLOOD Attack Filtering
- Enable to prevent the Transmission Control Protocol-Synchronize (TCP-SYN) flood attack.
10