●
Protocol:
Select the protocol (TCP, UDP, or ICMP) that can be used to
access the application.
●
Port
Range:
Type the port range that can be used to access the application in
the text boxes.
●
Incoming:
Defines which incoming communications users are permitted to
connect with.
●
Protocol:
Select the protocol (TCP, UDP, or ICMP) that can be used by the
incoming communication.
●
Port:
Type the port number that can be used for the incoming communication.
Add: Click to add the special application profile to the table at the bottom of the
screen.
Update: Click to update information for the special application if user have selected
a list item and have made changes.
Delete: Select a list item and click Delete to remove the item from the list.
New: Click “New” to erase all fields and enter new information.
2.5.6 DMZ
This screen enables user to create a DMZ for those computers that cannot access
Internet applications properly through the router and associated security settings.
Note: Any clients added to the DMZ exposes the clients to security risks such as
viruses and unauthorized access.
41