User's Guide
Table Of Contents
- 1 Package Contents
- 2 Introduction to the Interface
- 3 Connecting and Configuring the MPC8377EWLAN Wireless Router
- 3.1 Connecting the MPC8377EWLAN Wireless Router (Wired Computing)
- 3.2 Connecting the MPC8377EWLAN Wireless Router (Wireless Computing)
- 3.3 Setting Up the IP Address
- 3.4 Configuring the MCP8377EWLAN Wireless Router
- 3.5 Changing the Operation Mode
- 3.6 Selecting DynDNS Settings
- 3.7 Firewalls
- 4 Selecting or Changing System Items
- 5 Status
- 6 VPN
- 7 Managing Storage, Samba, and File Editing in NAS
- 8 Intrusion Detection Systems
- 9 Intrusion Prevention Systems
- 10 Logout
MPC8377EWLAN Wireless Router SW User’s Guide 70
Figure 8-4. IDS Alert Packets
9 Intrusion Prevention Systems
This section explains configuring the unit to detect electronic intrusion attempts. IPS is an advanced
technology to protect your network from malicious attacks. IPS works together with your SPI Firewall, IP
Based Access List (IP ACL), Network Address Port Translation (NAPT), and Virtual Private Network
(VPN) to achieve the highest amount of securities.
IPS works by providing real-time detection and prevention as an in-line module in a router. The Wireless-
N Security Router has hardware-based acceleration for real-time pattern matching for malicious attacks. It
actively filters and drops malicious TCP/UDP/ICMP/IGMP packets and can reset TCP connections. This
protects your client PCs and servers running various operating systems including Windows, Linux, and
Solaris from network worm attacks. However, this system does not prevent viruses attached emails.
The P2P (peer to peer) and IM (instant messaging) control allows the system administrator to prevent
network users from using those protocols to communicate with people over the Internet. This helps the
administrators to set up company policies on how to use their Internet bandwidth wisely.
Click IPS (Figure 9-1), then proceed with the respective sections.
Figure 9-1. IPS