User Manual
Table Of Contents
- 1 Introduction
- 2 Set up to access the internet
- 3 Web UI description
- 4 Internet Status
- 5 Internet Settings
- 6 WiFi Settings
- 7 Guest Network
- 8 Parental Control
- 9 VPN
- 10 USB App
- 11 Advanced Settings
- 12 System Settings
- Appendixes
98
Parameter description:
Parameter
Description
ICMP Flood Attack
Defense
Used to enable/disable the ICMP flood attack defense.
ICMP Flood Attack is an attack using ICMP packets.
If an attacker sends many ICMP ECHO packets to destination host, which results in ICMP
flood. Then destination host pays much time and resources on ICMP ECHO packets but
nothing on normal requests or responses, which achieves attack against destination
host.
TCP Flood Attack
Defense
Used to enable/disable the TCP flood attack defense.
In TCP protocol, when one device sends connection request and initialization to a server,
protocol stack in the server will leave Backlog Quene for information exchange in
connecting process.
Attackers make use of Backlog Quene and send TCP connection requests only with SYN
to the server many times by special program. Server will regard those requests as
uncompleted and establish sessions for them in Backlog Queue.
If those SYN requests are more than what server can hold, Backlog Queue will be full.
Then server will not accept new request so that other legal connection will be refused.
UCP Flood Attack
Defense
Used to enable/disable the UCP flood attack defense.
UCP Flood Attack works on the similar principle as ICMP Flood Attack. If an attacker
sends many UDP packets to destination host, the destination host pays much time and
resources on UDP packets but nothing on normal packet requests or responses, which
achieves attack against the destination host.
Ignore Ping Packet
Form WAN Port
It specifies whether to ignore ping packets from WAN port.
When host in the internet tries to ping WAN IP address of the router, the router will
ignore that ping request automatically, protecting itself from exposure to the internet
and external Ping attack.