0% found this document useful (0 votes)
7 views

Advanced Functions of Enterprise Router

Advanced Functions of Enterprise Router - TPNA studying using chatgpt to simplify

Uploaded by

Edward Sassky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Advanced Functions of Enterprise Router

Advanced Functions of Enterprise Router - TPNA studying using chatgpt to simplify

Uploaded by

Edward Sassky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Behavior Control - Web Filtering and Security (10 minutes)

What is Behavior Control?


Behavior Control on TP-Link routers helps manage what users can or cannot do on the internet. There are two
key features:

1. Web Filtering: Blocks certain websites (e.g., YouTube, gambling sites, adult content).
2. Web Security: Prevents certain actions (e.g., posting data, uploading files, or downloading specific file
types).

Why use Web Filtering and Security?

● Web Filtering: Blocks unwanted or harmful websites to keep the network safe.
● Web Security: Protects the network by stopping users from submitting sensitive data or downloading
dangerous files.

2. Firewall - Overview (10 minutes)

What is a Firewall?
A firewall monitors network traffic and blocks unwanted or dangerous traffic to protect the network from
attacks.

Types of Firewall Features:

● Anti ARP Spoofing: Protects against attackers who fake the identity of network devices (ARP
spoofing).
● Attack Defense: Helps prevent attacks that overwhelm the network (Flood Defense) or illegal packets
(Packet Anomaly Defense).
● MAC Filtering: Allows or blocks devices based on their unique hardware address (MAC address).
● Access Control: Filters and controls the traffic based on specific rules (e.g., block certain websites or
services).

3. Anti ARP Spoofing (10 minutes)

What is ARP Spoofing?

● ARP Spoofing is when an attacker sends false information to the network, tricking devices into sending
data to the attacker instead of the intended recipient.

How does Anti ARP Spoofing work?

● IP-MAC Binding: The router keeps a record of which IP address belongs to which device (MAC
address). If an attacker tries to send data using a fake MAC address, the router blocks the malicious
data.

Difference between DHCP Reservation and IP-MAC Binding:

● DHCP Reservation: The router always assigns the same IP address to a device based on its MAC
address, but this only works when the device gets its IP from the router.
● IP-MAC Binding: Ensures that only the correct device (based on its MAC address) can use a specific
IP address, and blocks any device trying to use a different IP.
4. Attack Defense - Flood and Packet Anomaly (10 minutes)

Flood Defense:

● Prevents too many connections from being created at once, which could overload the router and crash
the network (Flooding Attack).

Packet Anomaly Defense:

● Blocks any illegal or abnormal packets (like harmful data or malicious code) from entering the network.

5. MAC Filtering (10 minutes)

What is MAC Filtering?

● MAC Filtering controls which devices (identified by their unique MAC addresses) are allowed or denied
access to the network.

How it works:

● You can create a list of allowed MAC addresses (devices), and block any device not on that list.
● Alternatively, you can block specific devices by adding their MAC addresses to a deny list.

Example:

● Add known devices to the allow list to give them access.


● Add unknown or unauthorized devices to the deny list to block their access.

6. Access Control (10 minutes)

What is Access Control?


Access Control lets you block or allow certain types of network traffic based on specific rules.

How it works:

● You can block traffic based on:


○ Source IP (where the traffic is coming from)
○ Destination IP (where the traffic is going)
○ Specific applications (like HTTP or FTP)

Example:

● Block HTTP traffic (web browsing) for devices in the R&D department but allow it for Marketing.
7. Quiz and Review (5 minutes)

Quiz:

1. Which feature helps block websites like YouTube?


○ A) Web Filtering
○ B) Web Security
○ Answer: A) Web Filtering
2. What is the difference between DHCP Reservation and IP-MAC Binding?
○ A) DHCP Reservation assigns IP addresses dynamically
○ B) IP-MAC Binding ensures a device uses a specific IP and blocks anyone else using that IP
○ Answer: B) IP-MAC Binding ensures a device uses a specific IP and blocks others.
3. Which feature helps stop attackers from overwhelming the network with too many requests?
○ A) Flood Defense
○ B) Packet Anomaly Defense
○ Answer: A) Flood Defense

8. Key Takeaways (5 minutes)

● Web Filtering blocks specific websites you don't want users to access.
● Web Security stops specific actions like file uploads or data submission.
● Firewall protects your network from attacks and unwanted traffic using features like Anti ARP Spoofing
and Attack Defense.
● MAC Filtering allows you to control which devices can access the network.
● Access Control helps you set rules for which types of traffic can enter or leave the network.

You might also like