Текст страницы
Document version: V1.2
The following table describes the parameters displayed on this page.
Parameter description
Parameter
Description
Used to enable or disable the ICMP flood attack defense.
ICMP Flood Attack
Defense
The ICMP flood attack means that, to implement attacks on the target host, the
attacker sends a large number of ICMP Echo messages to the target host, which
causes the target host to spend a lot of time and resources on processing ICMP Echo
messages, but cannot process normal requests or responses.
Used to enable or disable the TCP flood attack defense.
TCP Flood Attack
Defense
The TCP flood attack means that, to implement attacks on the target host, the
attacker quickly initiates a large number of TCP connection requests in a short
period, and then suspends in a semi-connected state, thereby occupying a large
number of server resources until the server denies any services.
Used to enable or disable the UDP flood attack defense.
UDP Flood Attack
Defense
The UDP flood attack is implemented similarly with the ICMP flood attack, during
which the attacker sends a large number of UDP packets to the target host, causing
the target host to be busy processing these UDP packets, but unable to process
normal packet requests or responses.
Used to enable or disable the Block Ping From WAN function.
Block Ping From WAN
When it is enabled, the router automatically ignores the ping to its WAN from hosts
from the internet and prevents itself from being exposed, while preventing external
ping attacks.
10.9.4 DMZ host
Overview
A DMZ host on a LAN is free from restrictions in communicating with the internet. It is useful for
getting better and smoother experiences in video conferences and online games. You can also set
the host of a server within the LAN as a DMZ host when in need of accessing the server from the
internet.
A DMZ host is not protected by the firewall of the router. A hacker may leverage the DMZ host to
attack your LAN. Therefore, enable the DMZ function only when necessary.
Hackers may leverage the DMZ host to attack the local network. Do not use the DMZ host
function randomly.
Security software, antivirus software, and the built-in OS firewall of the computer may cause
DMZ function failures. Disable them when using the DMZ function. If the DMZ function is not
required, you are recommended to disable it and enable your firewall, security, and antivirus
software.
104