Netgear WPN824 User Manual Page 17

  • Download
  • Add to my manuals
  • Print
  • Page
    / 174
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 16
Reference Manual for the RangeMax Wireless Router WPN824
Introduction 2-3
202-10072-01, March 2005
WPA-PSK support. Support for Wi-Fi Protected Access (WPA) data encryption which
provides strong data encryption and authentication based on a pre-shared key.
Wireless access can be restricted by MAC address.
Wireless network name broadcast can be turned off so that only devices that have the network
name (SSID) can connect.
A Powerful, True Firewall with Content Filtering
Unlike simple Internet sharing NAT routers, the WPN824 is a true firewall, using stateful packet
inspection to defend against hacker attacks. Its firewall features include:
Denial of Service (DoS) protection.
Automatically detects and thwarts DoS attacks such as Ping of Death, SYN Flood, LAND
Attack, and IP Spoofing.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Logs security incidents.
The WPN824 will log security events such as blocked incoming traffic, port scans, attacks,
and administrator logins. You can configure the router to E-mail the log to you at specified
intervals. You can also configure the router to send immediate alert messages to your E-mail
address or E-mail pager whenever a significant event occurs.
The WPN824 prevents objectionable content from reaching your computers. The router allows
you to control access to Internet content by screening for keywords within Web addresses. You
can configure the router to log and report attempts to access objectionable Internet sites.
Security
The WPN824 router is equipped with several features designed to maintain security, as described
in this section.
Computers Hidden by NAT
NAT opens a temporary path to the Internet for requests originating from the local network.
Requests originating from outside the LAN are discarded, preventing users outside the LAN
from finding and directly accessing the computers on the LAN.
Page view 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 173 174

Comments to this Manuals

No comments