TP-Link 3G/4G TL-MR3220 V2 User Guide - Page 65
Advanced Security
View all TP-Link 3G/4G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 65 highlights
TL-MR3220 3G/4G Wireless N Router User Guide traffic passing through the session conforms to the protocol. SPI Firewall is enabled by factory default. If you want all the computers on the LAN exposed to the outside world, you can disable it. VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router's firewall. PPTP Passthrough - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable. L2TP Passthrough - Layer 2 Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enable. IPSec Passthrough - Internet Protocol Security (IPSec) is a suite of protocols for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. To allow IPSec tunnels to pass through the Router, keep the default, Enable. ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows customized Network Address Translation (NAT) traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, TFTP, H323, RTSP etc. FTP ALG - Select Enable, to allow FTP servers to operate properly. TFTP ALG - Select Enable, to allow TFTP servers to operate properly. H323 ALG - Select Enable, to allow H323 services to operate properly. RTSP ALG - Select Enable, to allow RTSP services to operate properly. Click the Save button to save your settings. 4.9.2 Advanced Security Choose menu "Security → Advanced Security", you can protect the Router from being attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-43. -56-