48
Action
tec Broadband Router User Manual
49
Chapter 5
Configuring the Router’s Security
2.
Check the “Block
IP
Fragments” box to protect the local network from a com-
mon type of hacker attack that uses fragmented data packets to sabotage the
network. Note that
VPN
over
IPS
ec and some
UDP
-based services make legiti-
mate use of
IP
fragments.
IP
fragments must be allowed to pass into the local
network to use these services.
3.
Click
Apply
to save changes.
Access Control
Access control is used to block specific computers within the local network (or even
the whole network) from accessing certain services on the Internet. For example,
one computer can be prohibited from surfing the Internet, another computer from
transferring files using
FTP
, and the whole network from receiving incoming E-mail.
Access control defines restrictions on the types of requests that can pass from the
local network out to the Internet, and thus may block traffic flowing in both direc-
tions. In the E-mail example given above, computers in the local network can be
prevented from receiving E-mail by blocking their outgoing requests to
POP
3
serv-
ers on the Internet.
Access control also incorporates a list of preset services in the form of applications
and common port settings.
Summary of Contents for Broadband Router MI408
Page 16: ...14 Actiontec Broadband Router User Manual This page left intentionally blank...
Page 24: ...22 Actiontec Broadband Router User Manual This page left intentionally blank...
Page 46: ...44 Actiontec Broadband Router User Manual This page left intentionally blank...
Page 132: ...130 Actiontec Broadband Router User Manual This page left intentionally blank...