User's Manual
Table Of Contents
- Choose a Computer and Connection Type
- Ethernet Connection
- Wireless Connection
- USB to PC Connection
- Connecting to VDSL via CoAX
- Setting Up IPTV
- Gateway (System) Pages
- Broadband Link Pages
- Home Network Pages
- Firewall Pages
- Accessing the Management and Diagnostic Console
- System Summary Page
- Broadband Link - Summary Page
- Broadband Link - Statistics Page
- Broadband Link - Configuration Page
- Local Network - Status Page
- Local Network - Statistics Page
- Local Network - Device List Page
- Local Network - Wireless Settings Page
- Local Network - Configuration Page
- Enabling Router Behind Router Alert
- Local Network - Address Allocation Page
- Local Network - Configure the MoCA Network Page
- Local Network - MoCA Statistics Page
- Firewall - Settings Page
- Firewall - Detailed Information Page
- Firewall - Advanced Settings Page
- Troubleshooting - DSL Diagnostics Page
- Troubleshooting - Event Log Page
- Troubleshooting - Network Tests Page
- Troubleshooting - Upgrade History Page
- Troubleshooting Resets Page
- Advanced - Syslog Settings Page
- Advanced - Provisioning Info Page
- Advanced - Configure Time Services Page
- Advanced - Configure Services Page
- Advanced - DNS Resolve Page
- Advanced - Link Manager States Page
- Advanced - Detailed Log Page
- Step 1: Enable Public Network Mode
- Step 2: Allocate Public IP Addresses to the LAN Clients
- Step 3: Configure Firewall Rules
- Sample Configuration
- LED overview
Gateway User Interface
29
Configuring Advanced Firewall Settings
The Edit Advanced Firewall Settings page allows you to configure advanced features on your firewall.
Enabling Advanced Security
The 2Wire gateway firewall already provides a high level of security. You can configure the firewall to provide
advanced security features, including stealth mode, strict UDP, or block pings.
• Stealth Mode. When in stealth mode, the 2Wire gateway firewall does not return information in
response to network queries; that is, it will appear to hackers who are trying to access your network
that your network does not exist. This discourages hackers from further attempts at accessing your
network, because to them it will appear as though there is no active network to access.
• Block Ping. Ping is a basic Internet program that, when used without malicious intent, allows a user to
verify that a particular IP address exists and can accept requests. Hackers can use ping to launch an
attack against your network, because ping can determine the number form of the network’s IP address
(for example, 105.246.172.72) from the domain name (for example, www.mynetwork.com). If you
enable Block Ping, your network will block all ping requests.