Line 37: |
Line 37: |
| <td>HTTPS Attack Prevention</td> | | <td>HTTPS Attack Prevention</td> |
| <td>Off</td> | | <td>Off</td> |
− | <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> | + | <td>Hypertext Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 137: |
Line 137: |
| <td>Root CA</td> | | <td>Root CA</td> |
| <td>Pre-uplouded</td> | | <td>Pre-uplouded</td> |
− | <td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwriten by any uploaded file.</td> | + | <td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwritten by any uploaded file.</td> |
| </tr> | | </tr> |
| <td>Universal Plug and Play</td> | | <td>Universal Plug and Play</td> |
Line 144: |
Line 144: |
| <td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td> | | <td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td> |
| </tr> | | </tr> |
− | <td>Universal Asynchronous Receiver – Transmiter</td> | + | <td>Universal Asynchronous Receiver – Transmitter</td> |
| <td>UART</td> | | <td>UART</td> |
| <td> By router admin password</td> | | <td> By router admin password</td> |
Line 195: |
Line 195: |
| <tr> | | <tr> |
| <td>Separate clients</td> | | <td>Separate clients</td> |
− | <td>Separate clients also known as wireless client isolation is a security feature that prevents wireless clients from communicating with one another. This feature adds aditional level of security to limit attacks and threats between devices connected to the wireless networks.</td> | + | <td>Separate clients also known as wireless client isolation is a security feature that prevents wireless clients from communicating with one another. This feature adds additional level of security to limit attacks and threats between devices connected to the wireless networks.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 233: |
Line 233: |
| | | |
| *Security fixes; | | *Security fixes; |
− | *Perfomance enchancements; | + | *Performance enhancements; |
| *Visual updates; | | *Visual updates; |
| So where is no reason why you shouldn't update firmware.</td> | | So where is no reason why you shouldn't update firmware.</td> |
Line 295: |
Line 295: |
| <td>HTTPS Attack Prevention</td> | | <td>HTTPS Attack Prevention</td> |
| <td>Off</td> | | <td>Off</td> |
− | <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> | + | <td>Hypertext Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |