| Help - Security | Help Index | Glossary |
| Firewall | |
| Enable | If enabled, DoS (Denial of Service) attacks will be detected and blocked. The default is enabled. It is strongly recommended that this setting be left enabled.
Note:
|
| Threshold | This setting affects the number of "half-open" connections allowed.
|
| Options | |
| Respond to ICMP | The ICMP protocol is used by the "ping" and "traceroute" programs, and by network monitoring and diagnostic programs.
|
| Allow VPN Passthrough |
The IPSec, PPTP, and L2TP protocols are used to establish a secure connection, and are widely used by VPN (Virtual Private Networking)programs.
Note: IPSec sessions must NOT use AH (Authentication Header). Packets using AH cannot be routed correctly. |
| Drop Fragmented IP Packets |
If enabled, fragmented IP packets are discarded, forcing re-transmission of these packets. In some situations, this could prevent successful commnunication. |
| Block TCP Flood | A TCP flood is excessively large number of TCP connection requests. This is usually a DoS (Denial of Service) attack. This setting should be normally be enabled. |
| Block UDP Flood | A UDP flood is excessively large number of UDP packets. This is usually a DoS (Denial of Service) attack. This setting should be normally be enabled. |
| Block non-standard packets |
Abnormal packets are often used by hackers and in DoS attacks, but may also be generated by mis-configured network devices. (PCs will normally not generate non-standard packets.) This setting should normally be enabled. |