Router Setup / Security

General Configuration
Firewall:
Default NAT:
Log Port Probing:
Stealth Mode:


Apply


Firewall
If enabled, inbound/outbound/self-access ACL will be checked as well as DoS filtering and stateful packet inspection.
Default NAT
If enabled, all outbound traffic source IP/Port will be translated to WAN Public IP address.
Log Port Probing
Connection attempt to closed ports of this system will be logged if this option is enabled. This can be evidenced by the port scans.
Stealth Mode
If enabled, system will not respond to the initiator when the remote peer initiates connection to system's TCP or UDP closed ports.

SYN/ICMP/UDP flooding
These attacks involve sending lots of TCP SYN/UDP/ICMP packets to a host in a very short time. This may slow down the victim's response time or crash the victim. If the number of packets exceeds user specified threshold, this device ignores further packets for one second.
IP Spoofing
Spoofing is the creation of TCP/IP packets using somebody else's IP address. IP spoofing is an integral part of many network attacks that do not need to see responses. Note: You need to disable this option if multiple networks are connect to LAN interface.