Page 56 / 114 Scroll up to view Page 51 - 55
52
Chapter 8
QoS
3 ) Set a low priority rule for the WIFI-GUEST.
a . Select
By Physical Port
and then select
WIFI-HOST
. Click
OK
.
4 ) The QoS rules list will display in the table.
Tips:
If you want to delete a QoS rule, click
to remove the responding rule from the list.
Now QoS is implemented to Prioritize Internet Traffic.
8. 2.
Update the Database
This function can help to add or update the applications of the router support. If the
applications you need are not listed in the Application list, you can try to download the
Done!
Page 57 / 114
53
Chapter 8
QoS
new version and upgrade. New database versions are posted at
www.tp-link.com
and
can be downloaded for free.
1. Download the latest QoS database from our website (
www.tp-link.com
).
2. G
o to
Advanced
>
QoS
>
Database
. Click
Browse
to select the database upgrade file,
then click
Upgrade
. Wait until the upgrade is completed and do not operate during
the process.
Page 58 / 114
Chapter
9
Network Security
This chapter guides you on how to protect your home network from cyber attacks
and unauthorized users by implementing these three network security functions. You
can protect your home network against DoS (Denial of Service) attacks from flooding
your network with server requests using DoS Protection, block or allow specific client
devices to access your network using Access Control, or you can prevent ARP spoofing
and ARP attacks using IP & MAC Binding function.
This chapter contains the following sections:
Protect the Network from Cyber Attacks
Access Control
IP & MAC Binding
Page 59 / 114
55
Chapter 9
Network Security
9. 1.
Protect the Network from Cyber Attacks
The SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection
protect the router from cyber attacks.
The SPI Firewall can prevent cyber attacks and validate the traffic that is passing
through the router based on the protocol. This function is enabled by default, and it’s
recommended to keep the default setting.
DoS Protection can protect your home network against DoS attacks from flooding your
network with server requests. Follow the steps below to configure DoS Protection.
1.
Visit
http://tplinkwifi.net
, and log in with the username and password you set for
the router.
2.
Go to
Advanced > Security > Settings.
3.
Enable
DoS Protection
.
4.
Set the level (
Off
,
Low
,
Middle
or
High
) of protection for
ICMP-FLOOD Attack
Filtering
,
UDP-FlOOD Attack Filtering
and
TCP-SYN-FLOOD Attack Filtering
.
ICMP-FLOOD Attack Filtering
- Enable to prevent the Internet Control Message
Protocol (ICMP) flood attack.
UDP-FlOOD Attack Filtering
- Enable to prevent the User Datagram Protocol
(UDP) flood attack.
TCP-SYN-FLOOD Attack Filtering
- Enable to prevent the Transmission Control
Protocol-Synchronize (TCP-SYN) flood attack.
Page 60 / 114
56
Chapter 9
Network Security
Tips:
The level of protection is based on the traffic packets number. The protection will be triggered immediately
when the number of packets exceeds the preset threshold value (the value can be set on
Advanced
>
System
Tools
>
System
Parameters
>
DoS Protection Level Settings
), and the vicious host will be displayed in the
Blocked
DoS Host List
.
5.
Select
Ignore Ping Packet From WAN Port
if you want to ignore the ping packets
from WAN port.
6.
Select
Forbid Ping Packet From LAN Port
if you want to ignore the ping packets
from LAN port.
7.
Click
Save
to make the settings effective.
9. 2.
Access Control
Access Control is used to block or allow specific client devices to access your network
(via wired or wireless) based on a list of blocked devices (Blacklist) or a list of allowed
devices (Whitelist).
Block or allow specific client devices to access my network (via
wired or wireless).
1.
Visit
http://tplinkwifi.net
, and log in with the username and
password you set for the router.
2.
Go to
Advanced > Security > Access Control.
I want to:
How can I
do that?

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top