3
Check the
Enable
box to the right of the entry to store settings.
4
Click the
Apply
button to activate the forwarding rules.
Table 14. Port Triggers Menu Option
Option
Description
Trigger Range
(Start / End
Port)
Enter the trigger range (starting and ending ports) of the application for which
you want to enable port triggering. The application will send data from these
ports.
Target Range
(Start / End
Port)
Enter the target range (starting and ending ports) to open for the same
application. The application will receive data on these ports.
Protocol
Select the protocol for this rule.
DMZ Host
The DMZ (De-militarized Zone) Host page allows you to configure a network device (e.g. a PC) to be
exposed or visible directly to the Internet. This may be used if an application doesn’t work with port
triggers. If you have an application that won’t run properly behind the NAT firewall, you can
configure it for unrestricted two-way Internet access by defining it as a virtual DMZ host. Adding a
client to the DMZ may expose your local network to various security risks because the client is not
protected, so use this option as a last resort.
To access the
DMZ Host
page:
1
Click
Advanced
in the menu bar.
2
Then click the
DMZ Host
submenu.
Figure 20 shows an example of the menu.
50
Summary of Contents for 5350
Page 1: ...Cable Modem Router with Wireless N U S E R M A N U A L ...
Page 30: ...Table 4 describes the items you can select Figure 7 Example of Diagnostics Ping Page 30 ...
Page 39: ...Figure 13 Example of Backup Page 39 ...
Page 63: ...Figure 25 Example of Basic Page 63 ...
Page 71: ...Figure 29 Example of Radio Page 71 ...
Page 81: ...Figure 37 Example of Advanced Page 81 ...
Page 85: ...Figure 39 Example of WMM Page 85 ...