34
1.
Trigger: The outbound port number issued by the application.
2.
Incoming Ports: When the trigger packet is detected, the inbound packets sent to the
specified port numbers are allowed to pass through the firewall.
This device provides some predefined settings. Select your application and click “Copy to” to
add the predefined setting to your list.
Click on “Save” to store your settings or click “Undo” to give up the changes.
3.1.2.3 DMZ
IP Address of DMZ Host:
DMZ (Demilitarized Zone) Host is a host without the protection of firewall. It allows a computer to
be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet
telephony and other special applications.