7 
Security 
 
 
7.1 
Configuring Firewall 
 
 
This procedure introduces how to configure the firewall to prevent malicious attack from the external 
network and enhance device security. 
 
Steps 
 
1. 
On the navigation tree, click [Security→ Firewall]. The firewall configuration page is displayed, 
see Figure 35. 
 
Figure 35 Firewall 
 
 
 
Table 24 lists the firewall parameters. 
 
Table 24 Firewall Parameters 
 
Enable Anti-Hacking 
Protection 
Select the check box to enable the firewall settings and prevent the 
device from being attacked by the Internet data stream. These attacks 
include ping flood, ping to death and syn flood. 
 High: It allows the legal WAN to access the device but forbids a de- 
vice from the Internet to send ping packets to the WAN interface of 
the ZXHN H108N. 
  Middle: It allows the legal WAN to access the device and a device 
from the Internet to send ping packets to the WAN interface of the 
ZXHN H108N. 
 Low: Allow legal WAN side access and Ping from WAN side.