User's Manual
Table Of Contents
- Choose a Computer and Connection Type
- Ethernet Connection
- Wireless Connection
- USB to PC Connection
- Connecting to VDSL via CoAX
- Setting Up IPTV
- Gateway (System) Pages
- Broadband Link Pages
- Home Network Pages
- Firewall Pages
- Accessing the Management and Diagnostic Console
- System Summary Page
- Broadband Link - Summary Page
- Broadband Link - Statistics Page
- Broadband Link - Configuration Page
- Local Network - Status Page
- Local Network - Statistics Page
- Local Network - Device List Page
- Local Network - Wireless Settings Page
- Local Network - Configuration Page
- Enabling Router Behind Router Alert
- Local Network - Address Allocation Page
- Local Network - Configure the MoCA Network Page
- Local Network - MoCA Statistics Page
- Firewall - Settings Page
- Firewall - Detailed Information Page
- Firewall - Advanced Settings Page
- Troubleshooting - DSL Diagnostics Page
- Troubleshooting - Event Log Page
- Troubleshooting - Network Tests Page
- Troubleshooting - Upgrade History Page
- Troubleshooting Resets Page
- Advanced - Syslog Settings Page
- Advanced - Provisioning Info Page
- Advanced - Configure Time Services Page
- Advanced - Configure Services Page
- Advanced - DNS Resolve Page
- Advanced - Link Manager States Page
- Advanced - Detailed Log Page
- Step 1: Enable Public Network Mode
- Step 2: Allocate Public IP Addresses to the LAN Clients
- Step 3: Configure Firewall Rules
- Sample Configuration
- LED overview
Gateway User Interface
31
• Packet Flood (SYN/UDP/ICMP/Other). When enabled, the firewall will check for SYN, UDP, ICMP, and
other types of packet floods on the local and Internet facing interfaces and stop the flood.
• Invalid TCP Flag Attacks (NULL/XMAS/Other). When enabled, the firewall will scan inbound and
outbound packets for invalid TCP Flag settings, and drop the packet to prevent SYN/FIN, NULL, and
XMAS attacks.
• Invalid ICMP Detection. The firewall checks for invalid ICMP/code types, and drops the packet.
• Miscellaneous. The firewall checks for the following:
− Unknown IP protocol — drop packet.
− Port 0 attack detected — drop packet.
− TCP SYN packet — drop packet.
− Not a start session packet — drop packet.
− ICMP destination unreachable — terminate session.