Advanced Functions of Enterprise Router
Advanced Functions of Enterprise Router
1. Web Filtering: Blocks certain websites (e.g., YouTube, gambling sites, adult content).
2. Web Security: Prevents certain actions (e.g., posting data, uploading files, or downloading specific file
types).
● Web Filtering: Blocks unwanted or harmful websites to keep the network safe.
● Web Security: Protects the network by stopping users from submitting sensitive data or downloading
dangerous files.
What is a Firewall?
A firewall monitors network traffic and blocks unwanted or dangerous traffic to protect the network from
attacks.
● Anti ARP Spoofing: Protects against attackers who fake the identity of network devices (ARP
spoofing).
● Attack Defense: Helps prevent attacks that overwhelm the network (Flood Defense) or illegal packets
(Packet Anomaly Defense).
● MAC Filtering: Allows or blocks devices based on their unique hardware address (MAC address).
● Access Control: Filters and controls the traffic based on specific rules (e.g., block certain websites or
services).
● ARP Spoofing is when an attacker sends false information to the network, tricking devices into sending
data to the attacker instead of the intended recipient.
● IP-MAC Binding: The router keeps a record of which IP address belongs to which device (MAC
address). If an attacker tries to send data using a fake MAC address, the router blocks the malicious
data.
● DHCP Reservation: The router always assigns the same IP address to a device based on its MAC
address, but this only works when the device gets its IP from the router.
● IP-MAC Binding: Ensures that only the correct device (based on its MAC address) can use a specific
IP address, and blocks any device trying to use a different IP.
4. Attack Defense - Flood and Packet Anomaly (10 minutes)
Flood Defense:
● Prevents too many connections from being created at once, which could overload the router and crash
the network (Flooding Attack).
● Blocks any illegal or abnormal packets (like harmful data or malicious code) from entering the network.
● MAC Filtering controls which devices (identified by their unique MAC addresses) are allowed or denied
access to the network.
How it works:
● You can create a list of allowed MAC addresses (devices), and block any device not on that list.
● Alternatively, you can block specific devices by adding their MAC addresses to a deny list.
Example:
How it works:
Example:
● Block HTTP traffic (web browsing) for devices in the R&D department but allow it for Marketing.
7. Quiz and Review (5 minutes)
Quiz:
● Web Filtering blocks specific websites you don't want users to access.
● Web Security stops specific actions like file uploads or data submission.
● Firewall protects your network from attacks and unwanted traffic using features like Anti ARP Spoofing
and Attack Defense.
● MAC Filtering allows you to control which devices can access the network.
● Access Control helps you set rules for which types of traffic can enter or leave the network.
○