User Guide
Page 180
... configure UPnP port mapping to allow web configurator access from the WAN but it to work, you may make it more susceptible to snooping and hacking attacks. 9.5.3 The NSA's Services and UPnP This section introduces the NSA's services which an Internet gateway can use UPnP to allow access to the NSA...
... configure UPnP port mapping to allow web configurator access from the WAN but it to work, you may make it more susceptible to snooping and hacking attacks. 9.5.3 The NSA's Services and UPnP This section introduces the NSA's services which an Internet gateway can use UPnP to allow access to the NSA...
User Guide
Page 219
Chapter 10 Applications Note: The download service notification only keeps track of hacking attacks, which can be protected against them. Figure 125 Firewall Ideally your firewall should have the following: • Stateful packet inspection to detect malicious packets ... protect the computer itself, not the NSA since your computer is not between the Internet and your network and protect your NSA (and computers) from hacking attacks. • IDP (Intrusion Detection and Prevention) to control access between your IP address.
Chapter 10 Applications Note: The download service notification only keeps track of hacking attacks, which can be protected against them. Figure 125 Firewall Ideally your firewall should have the following: • Stateful packet inspection to detect malicious packets ... protect the computer itself, not the NSA since your computer is not between the Internet and your network and protect your NSA (and computers) from hacking attacks. • IDP (Intrusion Detection and Prevention) to control access between your IP address.