User's Manual

76
Disable: to disable the MAC filter function.
Allow: to enable the MAC filter function and allow the host of the following set MAC
addresses to access.
Block: to enable the MAC filter function and block the host of the following set MAC
addresses to access.
MAC Address: Enter the MAC addresses you wish to manage.
Time Schedule: It is self-defined time period. You may specify a time schedule for your prioritization
policy. For setup and detail, refer to Time Schedule section.
Intrusion Detection
Check Enable if you wish to detect intruders accessing your computer without permission. The
router automatically detects and blocks a DoS (Denial of Service) attack if a user enables this
function. This kind of attack is not to access confidential data on the network; instead, it aims to
disrupt specific equipment or the entire network. If this happens, users will have trouble accessing
the network resources.
Intrusion Detection: Check Enable if you wish to detect intruders accessing your computer without
permission.
Maximum TCP Open Handshaking Count: This is a threshold value to decide whether a SYN
Flood attempt is occurring or not. Default value is 100 TCP SYN per seconds.
Maximum Ping Count: This is a threshold value to decide whether an ICMP Echo Storm is
occurring or not. Default value is 15 ICMP Echo Requests (PING) per second.
Maximum ICMP Count: This is a threshold to decide whether an ICMP flood is occurring or not.
Default value is 100 ICMP packets per seconds except ICMP Echo Requests (PING).
Log: Check Log if you wish to generate logs when the filer rule is applied to the Intrusion Detection.
For SYN Flood, ICMP Echo Storm and ICMP flood, IDS will just warn the user in the Event Log but it
will not be able to protect against such attacks.
Hacker attack types recognized by the IDS
Intrusion Name Detect Parameter Blacklist
Type of Block
Duration
Drop Packet Show Log
Ascend Kill
Ascend Kill data Src IP DoS Yes Yes