TP-Link Archer AC1900 Archer AC1900USW V1.6 User Guide - Page 45

Network Security

Page 45 highlights

Chapter 10 Network Security This chapter guides you on how to protect your home network from cyber attacks and unauthorized users by implementing these three network security functions. You can protect your home network from cyber attacks, block or allow specific client devices to access your network using Access Control, or you can prevent ARP spoofing and ARP attacks using IP & MAC Binding. It contains the following sections: • Protect the Network from Cyber Attacks • Access Control • IP & MAC Binding • ALG (Application Layer Gateway)

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

Chapter
10
Network Security
This chapter guides you on how to protect your home network from cyber attacks and
unauthorized users by implementing these three network security functions. You can
protect your home network
from cyber attacks, block or allow specific client devices to
access your network using Access Control, or you can prevent ARP spoofing and ARP
attacks using IP & MAC Binding.
It contains the following sections:
Protect the Network from Cyber Attacks
Access Control
IP & MAC Binding
ALG (Application Layer Gateway)