TP-Link Archer MR400 Archer MR400EU V1 User Guide - Page 24

Network Security

Page 24 highlights

Chapter 6 Network Security This chapter guides you on how to protect your home network from unauthorized users by implementing these three network security functions. You can block or allow specific client devices to access your wireless network using MAC Filtering, or using Access Control for wired and wireless networks, or you can prevent ARP spoofing and ARP attacks using IP & MAC Binding. • MAC Filtering • Access Control • IP & MAC Binding

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

Chapter
6
Network Security
This chapter guides you on how to protect your home network from unauthorized
users by implementing these three network security functions. You can block or allow
specific client devices to access your wireless network using MAC Filtering, or using
Access Control for wired and wireless networks, or you can prevent ARP spoofing and
ARP attacks using IP & MAC Binding.
MAC Filtering
Access Control
IP & MAC Binding