TP-LINK wireless router configuration Advanced Security Settings

Source: Internet
Author: User

You should have heard of DOS attacks more or less. The general principle is that the host initiating the attack sends a large amount of information to the attacked host to be processed, until the affected host cannot process other normal access requests, if more than one source address of the host initiating the attack is DDOS (distributed denial of service attack ), if the hardware configuration of the affected host is good enough, we can stick to it for about half past one. For low-end configuration and basic seckilling, We can configure a wireless router to prevent hosts on the LAN from participating in this activity. Once discovered, immediately, the attack host will be prohibited from connecting to the network, next we will take TP-LINK (universal) wireless router as an example to demonstrate how to configure advanced security settings to prevent DOS attacks. Configure Advanced Security Settings

Select "Security Settings-Advanced Security Settings" from the menu ":

  • Data Packet statistical interval: literally, it is easy to understand, that is, how long it takes to perform a sampling analysis on the data streams through the wireless router, the value here is the same as the "data packet statistical interval" in "system tool-Traffic Statistics", and can be changed wherever possible.
  • DOS attack prevention: only when this setting is enabled can the following specific preventive measures be checked.
  • Enable ICMP-FLOOD attack filtering: the packet sent by the PING command is a type of ICMP information flow, the old version of the system will cause system paralysis when receiving a large number of ICMP data packets, the legendary "Death PING" belongs to this type of attack.
  • ICMP-FLOOD packet threshold: When the ICMP packet transmission rate is greater than the value set here, it will be considered as a ICMP-FLOOD attack.
  • Enable UDP-FLOOD attack filtering: In the OSI reference model, TCP and UDP are two transport layer protocols. The characteristics of UDP protocol is that the packet sending and receiving do not need to establish a connection in advance, for example, the DNS Service uses the UDP53 port to provide external services (for more information, see common services in WINDOWS and corresponding ports ).
  • UDP-FLOOD packet threshold: interpreted as the ICMP-FLOOD packet threshold.
  • Enable TCP-SYN-FLOOD attack filtering: the above said UDP, let's talk about TCP, SYN is a status of TCP communication when establishing a connection, that is, the legendary synchronization status, the attacked host can send a large number of SYN requests to the affected host, but the attacker does not complete the synchronization, so the victim will only be silly, rather sinister.
  • TCP-SYN-FLOOD packet threshold: meaning the same as the two sides.
  • Ignore the PING from the WAN port: once this function is enabled, no WAN host can PING the WAN port of the wireless router.
  • Disable PING packets from LAN ports through routers: This function prohibits LAN hosts from pinging Wan hosts.

After setting, click Save.

List of DOS banned hosts

The host deemed to be an attacker will be automatically added to this table. In other words, the host cannot be connected to the WAN. Click Delete to remove the host.


Notes

You must enable the traffic statistics function in "System Tools-Traffic Statistics" to prevent DOS attacks.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.