TP-Link TL-R480T User Guide - Page 50

TL-R480T, Region, Scan Attack Defence, IP Scan, destination IP addresses

Page 50 highlights

TL-R480T SMB Broadband Router User Guide Figure 4-37 ¾ Region - This option used to select the specifically area from which the packets will be monitored by the next settings. ¾ Scan Attack Defence • IP Scan: During the specific time, if a computer (identified by a particular source IP address) transmits packets to at least ten different computers (identified by different destination IP addresses), then the source IP address will be deemed to make IP Attacks. And the Router will start up the blocking function immediately. 44

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

TL-R480T
SMB Broadband Router User Guide
44
Figure 4-37
¾
Region -
This option used to select the specifically area from which the packets will be
monitored by the next settings.
¾
Scan Attack Defence
IP Scan:
During the specific time, if a computer (identified by a particular source IP
address) transmits packets to at least ten different computers (identified by different
destination IP addresses), then the source IP address will be deemed to make IP Attacks.
And the Router will start up the blocking function immediately.