TP-Link Archer VR200 Archer VR200 V1 User Guide - Page 28
Network Security
View all TP-Link Archer VR200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 28 highlights
Chapter 6 Network Security This chapter guides you on how to protect your home network from unauthorized users by implementing these three network security functions. You can block or allow specific client devices to access your wireless network using MAC Filtering, or using Access Control for wired and wireless networks, or you can prevent ARP spoofing and ARP attacks using IP & MAC Binding. • MAC Filtering • Access Control • IP & MAC Binding
Chapter
6
Network Security
This chapter guides you on how to protect your home network from unauthorized
users by implementing these three network security functions. You can block or allow
specific client devices to access your wireless network using MAC Filtering, or using
Access Control for wired and wireless networks, or you can prevent ARP spoofing and
ARP attacks using IP & MAC Binding.
•
MAC Filtering
•
Access Control
•
IP & MAC Binding