Table 20. Port Triggers Menu Option
Option
Description
Trigger Range
(Start / End
Port)
Enter the trigger range (starting and ending ports) of the application
for which you want to enable port triggering. The application will
send data from these ports.
Target Range
Enter the target range (starting and ending ports) to open for the
same application. The application will receive data on these ports.
(Start / End
Port)
Select the protocol for this rule.
Protocol
Description
Enter the Description name here.
Enable
Select ON or OFF to enable Port Triggering rule.
DMZ Host
The DMZ (De-militarized Zone) Host page allows you to configure a network device (e.g.
a PC) to be exposed or visible directly to the Internet. This may be used if an application
doesn’t work with port triggers. If you have an application that won’t run properly behind
the NAT firewall, you can configure it for unrestricted two-way Internet access by defining
it as a virtual DMZ host. Adding a client to the DMZ may expose your local network to
various security risks because the client is not protected, so use this option as a last
resort.
To access the
DMZ Host
page:
1
Click the
Router
menu tab.
2
Then click the
Advanced
/
DMZ Host
submenu.
Figure 21 shows an example of the menu.
87
Summary of Contents for 5363
Page 1: ...Cable Modem Router Cable Modem plus Dual band Wireless AC Router U S E R M A N U A L ...
Page 50: ...Figure 4 Example Wireless Primary Network page 50 ...
Page 54: ...Figure 5 Example of Guest Network Page 54 ...
Page 64: ...Figure 9 Example of Access Control Page 64 ...
Page 80: ...Figure 17 Example of IP Filtering Page 80 ...
Page 104: ...Figure 27 Example of Basic Setup Page 104 ...
Page 134: ...Figure 42 Example of the Connection Page 134 ...