F5D7631-4_Manual
Page 36 of 61
A list of popular applications has been included to choose from. Click on “Select
a Service” then select your application from the drop-down list. The settings will
be transferred to the first row available. Click “Add” to save the setting for that
application.
Manually Entering Settings into the Virtual Server
To manually enter settings, click on “Custom Server” and enter a name for the
server. Enter the Server IP address in the space provided for the internal
machine and the port(s) required to pass. Then select the the protocol type (TCP
or UDP), and
then click “Add”.
Opening ports in your firewall can pose a security risk. You can enable and
disable settings very quickly. It is recommended that you disable the settings
when you are not using a specific application.
Client IP Filters
The Router can be configured to restrict access to the Internet, email, or other
network services at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer for example, enter a name
of the filter in “Filter Name” box (1) and IP address of the computer you
wish to restrict access to in the IP field (2). Next, enter “80:80” in the Port
fields (3). Select protocol from the “Protocol” drop down box (4). Click
“Apply Changes”. The computer at the IP address you specified will now
be blocked from Internet access.
MAC Address Filtering
The MAC address filter is a powerful security feature that allows you to specify
which computers are allowed on the network. Any computer attempting to access
the network that is not specified in the filter list will be denied access. When you
enable this feature, you must enter a name for the user and the MAC address of
each client on your
network to allow network access. Next, click “Add” to save the settings.
DMZ (Demilitarized Zone)
If you have a client PC that cannot run an Internet application properly from
behind the firewall, you can open the client up to unrestricted two-way Internet
access. This may be necessary if the NAT feature is causing problems with an
application such as a game or video conferencing application. Use this feature on
a temporary basis.
The computer in the DMZ is not protected from hacker
attacks.