Compex Technologies NP25G 6C User Manual

Page of 110
 
Page 5 
Security Features  
 
 
 
 
 
 
 
 
Internet Access Policies: Time-based Management, URL 
filtering, Packet filtering 
To complement the powerful firewall technologies incorporated 
into the router product, you can use the comprehensive set of 
security management features to regulate the types of Internet 
access permitted. You may set up time-based access policies 
and block objectionable websites from children, or even set up 
packet filtering rules to control the transmission of TCP, UDP 
packets for different ports. 
Stateful Packet Inspection (SPI) firewall 
More than just a “NAT” firewall, there is a powerful Stateful Packet 
Inspection (SPI) firewall  in the router.  Stateful inspection 
compares certain key parts of the packet to a database of 
trusted information.  SPI Firewall is unlike the normal firewall that 
only checks the headers of the packets, it also scrutinizes the 
contents of the packets, ensuring the integrity of the packets. 
Built-in “NAT” firewall 
As the router handles the incoming and outgoing traffic of data 
packets between the internal and external network, it checks 
whether incoming WAN packets are legitimate replies to requests 
from LAN users before allowing them to pass into the LAN. This 
checking provides effective firewall protection because rogue 
Internet packets will be automatically discarded. 
WPA-PSK and 64/128-bit WEP encryption support for 
wireless security 
The router uses a private key encryption known as Wired 
Equivalent Privacy protocol with key lengths of either 64-bit or 128-
bit, so that data communication in your wireless network can be 
protected. Additionally, with WPA-PSK, the router provides home 
and SOHO users with the highest-level security.