3
Check the
Enable
box to the right of the entry to store settings.
4
Click the
Apply
button to activate the forwarding rules.
Table 14. Port Triggers Menu Option
Option
Description
Trigger Range
(Start / End
Port)
Enter the trigger range (starting and ending ports) of the application for which
you want to enable port triggering. The application will send data from these
ports.
Target Range
(Start / End
Port)
Enter the target range (starting and ending ports) to open for the same
application. The application will receive data on these ports.
Protocol
Select the protocol for this rule.
DMZ Host
The DMZ (De-militarized Zone) Host page allows you to configure a network device (e.g. a PC) to be
exposed or visible directly to the Internet. This may be used if an application doesn’t work with port
triggers. If you have an application that won’t run properly behind the NAT firewall, you can
configure it for unrestricted two-way Internet access by defining it as a virtual DMZ host. Adding a
client to the DMZ may expose your local network to various security risks because the client is not
protected, so use this option as a last resort.
To access the
DMZ Host
page:
1
Click
Advanced
in the menu bar.
2
Then click the
DMZ Host
submenu.
Figure 20 shows an example of the menu.
50
Содержание 5350
Страница 1: ...Cable Modem Router with Wireless N U S E R M A N U A L ...
Страница 30: ...Table 4 describes the items you can select Figure 7 Example of Diagnostics Ping Page 30 ...
Страница 39: ...Figure 13 Example of Backup Page 39 ...
Страница 63: ...Figure 25 Example of Basic Page 63 ...
Страница 71: ...Figure 29 Example of Radio Page 71 ...
Страница 81: ...Figure 37 Example of Advanced Page 81 ...
Страница 85: ...Figure 39 Example of WMM Page 85 ...
Страница 95: ...Figure 43 Example of L2TP PPTP Page 95 ...