TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 77

Attack Defense

Page 77 highlights

Indicates that the IP and MAC address of this entry are already bound. To bind the entries in the list, check these entries and click the button, then the settings will take effect if the entries do not conflict with the existed entries. Note: If the local hosts suffered from ARP attack, you cannot add IP-MAC Binding entries on this page. Please add entries manually on 3.4.1.1 IP-MAC Binding. 3.4.1.3 ARP List On this page, the IP-MAC information of the hosts which communicated with the Router recently will be saved in the ARP list. Choose the menu Firewall→Anti ARP Spoofing→ARP List to load the following page. Figure 3-48 ARP List The configurations for the entries is the same as the configuration of List of Scanning Result on 3.4.1.2 ARP Scanning page. The unbound IP-MAC information will be replaced by new IP-MAC information or be automatically removed from the list if it has not been communicated with others for a long time. This period is regarded as the aging time of the ARP information. 3.4.2 Attack Defense With Attack Defense function enabled, the Router can distinguish the malicious packets and prevent the port scanning from external network, so as to guarantee the network security. Choose the menu Firewall→Attack Defense→Attack Defense to load the following page. -72-

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

-72-
Indicates that the IP and MAC address of this entry are already bound.
To bind the entries in the list, check these entries and click the <Import>
button, then the settings will
take effect if the entries do not conflict with the existed entries.
Note:
If the local hosts suffered from ARP attack, you cannot add IP-MAC Binding entries on this page.
Please add entries manually on
3.4.1.1 IP-MAC Binding
.
3.4.1.3
ARP List
On this page, the IP-MAC information of the hosts which communicated with the Router recently will
be saved in the ARP list.
Choose the menu
Firewall
Anti ARP Spoofing
ARP List
to load the following page.
Figure 3-48 ARP List
The configurations for the entries is the same as the configuration of List of Scanning Result on
3.4.1.2
ARP Scanning
page.
The unbound IP-MAC information will be replaced by new IP-MAC information or be automatically
removed from the list if it has not been communicated with others for a long time. This period is
regarded as the aging time of the ARP information.
3.4.2 Attack Defense
With Attack Defense function enabled, the Router can distinguish the malicious packets and prevent
the port scanning from external network, so as to guarantee the network security.
Choose the menu
Firewall
Attack Defense
Attack Defense
to load the following page.