Intrusion Detection

The Wireless Router’s firewall inspects packets at the network layer, maintains TCP and UDP session information including time-outs and the number of active sessions, and provides the ability to detect and prevent certain kinds of network attacks.

The Intrusion Detection page has the following sections:

Make your intrusion detection selections, and remember to click Save Settings when you are finished.

Intrusion Detection Feature

Use this section of the Intrusion Detection page to enable the following kinds of protection:

Stateful Packet Inspection

Stateful Packet Inspection (SPI) helps protect your network from unwanted traffic by performing the following tasks:

To enable SPI,

  1. Under Instrusion Detection Feature, select SPI and Anti-DoS firewall protection.
  2. Select the traffic type or types to be allowed through the firewall: Packet Fragmentation, TCP Connection, UDP Session, FTP Service, or TFTP Service.
  3. Only the selected types of traffic initiated from the internal LAN will be allowed. For example, if you select FTP Service only, all incoming traffic will be blocked except for FTP connections initiated from the local LAN.

  4. Click Save Settings.

When hackers attempt to enter your network, the wireless router can alert you by e-mail

Use this section to set up the email address at which you want to be notified when unauthorized access is attempted.

  1. Enter all of the fields that apply to your email configuration:

Connection Policy

  1. Enter the appropriate values for TCP/UDP sessions:
  2. Click Save Settings.

DoS Detect Criteria

Network attacks that deny access to a network device are called Denial-of-Service (DoS) attacks. DoS attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Wireless Router protects against the following kinds of DoS attack:

  • IP Spoofing • Land Attack • Ping of Death
  • IP with zero length • Smurf Attack • UDP port loopback
  • Snork Attack • TCP null scan • TCP SYN flooding

  1. Enter the appropriate values for the Denial of Service (DoS) detect and port scan criteria:
  • Click Save Settings.