TP-Link AC750 Archer C20i V1 User Guide - Page 92

Advanced Security

Page 92 highlights

Archer C20i AC750 Wireless Dual Band Router  L2TP Passthrough - Layer Two Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the Internet on the Layer Two level. To allow L2TP tunnels to pass through the router, click Enable.  IPSec Passthrough - Internet Protocol security (IPSec) is a suite of protocols for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. To allow IPSec tunnels to pass through the router, click Enable.  ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows customized Network Address Translation (NAT) traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, TFTP, H323 etc.  FTP ALG - To allow FTP clients and servers to transfer data across NAT, click Enable.  TFTP ALG - To allow TFTP clients and servers to transfer data across NAT, click Enable.  H323 ALG - To allow Microsoft NetMeeting clients to communicate across NAT, click Enable.  SIP ALG - To allow SIP clients and servers to communicate across NAT, click Enable.  RTSP ALG - To allow some media player clients to communicate with some streaming media servers across NAT, click Enable. Click the Save button to save your settings. 4.13.2 Advanced Security Choose menu "Security → Advanced Security", and then you can protect the router from being attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-69. - 81 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142

Archer C20i
AC750 Wireless Dual Band Router
- 81 -
L2TP Passthrough
- Layer Two Tunneling Protocol (L2TP) is the method used to
enable Point-to-Point sessions via the Internet on the Layer Two level. To allow L2TP
tunnels to pass through the router, click
Enable
.
IPSec Passthrough
- Internet Protocol security (IPSec) is a suite of protocols for
ensuring private, secure communications over Internet Protocol (IP) networks, through
the use of cryptographic security services. To allow IPSec tunnels to pass through the
router, click
Enable
.
ALG -
It is recommended to enable Application Layer Gateway (ALG) because ALG allows
customized Network Address Translation (NAT) traversal filters to be plugged into the
gateway to support address and port translation for certain application layer "control/data"
protocols such as FTP, TFTP, H323 etc.
FTP ALG
- To allow FTP clients and servers to transfer data across NAT, click
Enable
.
TFTP ALG
- To allow TFTP clients and servers to transfer data across NAT, click
Enable
.
H323 ALG
- To allow Microsoft NetMeeting clients to communicate across NAT, click
Enable
.
SIP ALG -
To allow SIP clients and servers to communicate across NAT, click
Enable.
RTSP ALG
- To allow some media player clients to communicate with some streaming
media servers across NAT, click
Enable
.
Click the
Save
button to save your settings.
4.13.2
Advanced Security
Choose menu “
Security
Advanced Security
”, and then you can protect the router from being
attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-69.