TP-Link AD7200 AD7200 V1 User Guide - Page 64

Protect the Network from Cyber Attacks

Page 64 highlights

Chapter 9  9. 1. Protect the Network from Cyber Attacks The SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection protect the router from cyber attacks. The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This function is enabled by default, and it's recommended to keep the default setting. DoS Protection can protect your home network against DoS attacks from flooding your network with server requests. Follow the steps below to configure DoS Protection. 1. Visit http://tplinkwifi.net, and log in with the username and password you set for the router. 2. Go to Advanced > Security > Settings. 3. Enable DoS Protection. 4. Set the level (Off, Low, Middle or High) of protection for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering and TCP-SYN-FLOOD Attack Filtering. • ICMP-FLOOD Attack Filtering - Enable to prevent the Internet Control Message Protocol (ICMP) flood attack. • UDP-FlOOD Attack Filtering - Enable to prevent the User Datagram Protocol (UDP) flood attack. • TCP-SYN-FLOOD Attack Filtering - Enable to prevent the Transmission Control Protocol-Synchronize (TCP-SYN) flood attack. Tips: The level of protection is based on the number of traffic packets. The protection will be triggered immediately when the number of packets exceeds the preset threshold value (the value can be set on Advanced > System Tools > System Parameters > DoS Protection Level Settings), and the vicious host will be displayed in the Blocked DoS Host List. 60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126

60
Chapter 9
9. 1.
Protect the Network from Cyber Attacks
The SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection
protect the router from cyber attacks.
The SPI Firewall can prevent cyber attacks and validate the traffic that is passing
through the router based on the protocol. This function is enabled by default, and it’s
recommended to keep the default setting.
DoS Protection can protect your home network against DoS attacks from flooding your
network with server requests. Follow the steps below to configure DoS Protection.
1.
Visit
http://tplinkwifi.net
, and log in with the username and password you set for
the router.
2.
Go to
Advanced
>
Security
>
Settings
.
3.
Enable
DoS Protection
.
4.
Set the level (
Off
,
Low
,
Middle
or
High
) of protection for
ICMP-FLOOD Attack
Filtering
,
UDP-FlOOD Attack Filtering
and
TCP-SYN-FLOOD Attack Filtering
.
ICMP-FLOOD Attack Filtering
- Enable to prevent the Internet Control Message
Protocol (ICMP) flood attack.
UDP-FlOOD Attack Filtering
- Enable to prevent the User Datagram Protocol
(UDP) flood attack.
TCP-SYN-FLOOD Attack Filtering
- Enable to prevent the Transmission Control
Protocol-Synchronize (TCP-SYN) flood attack.
Tips:
The level of protection is based on the number of traffic packets. The protection will be triggered immediately
when the number of packets exceeds the preset threshold value (the value can be set on
Advanced
>
System
Tools
>
System Parameters
>
DoS Protection Level Settings
), and the vicious host will be displayed in the
Blocked DoS Host List
.