Page 31 / 92 Scroll up to view Page 26 - 30
X5668 / X5668U
User’s Guide
26
Bridging
Figure 25: WAN Connection, Bridging Configuration
To configure the Bridging settings:
Check “
Enable Bridge Service
” to enable bridge service
Enter the
Service Name
for this bridging interface.
Click
Next
The
WAN Setup Summary
page shows all of parameters. Click
Save
if correct and
click
Back
to restart the configuration again.
Page 32 / 92
X5668 / X5668U
User’s Guide
27
LAN
Figure 26: LAN Configuration
To configure LAN:
Enter the
IP address
which the CPE in the LAN will use to connect to the device.
For example, enter 192.168.1.1
Enter the
Subnet Mask
. For example, enter 255.255.255.0
Check to enable UPnP feature
Check to
Enable IGMP Snooping
. This feature will snoop all of IGMP packets
and record related information. Therefore, multicast packets will be generated to
the related LAN ports only to avoid the packet flooding on all of LAN ports. Select
one of two modes,
Standard mode
or
Blocking mode
.
Select to
Enable or Disable DHCP server
. If it is enabled, please enter the DHCP
IP pool of
Start IP address
and
End IP address
. Enter the value of
leased time
in
hour about the valid period of assigned IP address. The DHCP server ON
(enabled) feature will enable this device to assign IP address automatically to PC
in LAN if PC requests an IP address by DHCP client protocol.
Click
Save
to save the configuration
Page 33 / 92
X5668 / X5668U
User’s Guide
28
NAT (Network Access Translation)
The NAT feature provides the basic firewall feature to avoid hacker attacks from
remote site. There are three more setting pages including virtual server, port trigger,
and DMZ to provide specified service for remote users.
Virtual Server
Virtual Server enables you to run a server on your local network that can be accessed
from the remote parties. You need to set up a rule to tell the device on which computer
the server is held. When port virtual server is enabled, your router (the device) routes
all the inbound traffic on a particular port to the chosen computer on your network.
Figure 27: Virtual Server Setup Configuration
Click Add to add a rule of virtual server.
Figure 28: Add A Rule Of Virtual Server
Global Setting
Select a
service
from the predefined list or enter the name of
Custom Server
Enter the
Server IP Address
located in the LAN to provide the service to remote
party
Page 34 / 92
X5668 / X5668U
User’s Guide
29
Enter the
Start External Port #
and
End External Port #
that open to remote to
access the service
Select the
Protocol
from the list
Enter the
Start Internal Port #
and
End Internal Port #
that may use different port
# to secure the service. If you use the same port # as
external port #
, please
leave
Internal Port #
as blank.
Click
Save/Apply
Port Triggering
The feature is similar to the virtual server, but provides a more secure way to provide
your device. It opens up the port hole temporary and allows CPE in LAN to establish a
connection with remote parties. Those ports are open only if a specified request from
a PC in LAN is received, and then the device allows the remote parties to access to
establish a connection with that PC in LAN.
Figure 29: Port Triggering Setup
Click
Add
to add a rule of port triggering.
Global Setting
Select a
service
from the predefined list or enter the name of
Custom Server
Enter the
Server IP Address
located in the LAN to provide the service to remote
party
Enter the
Start Trigger Port #
and
End Trigger Port #
that open to remote to
access the service
Select the
Trigger Protocol
Enter the
Start Open Port #
and
End Open Port #
that may use different port # to
secure the service. If you use the same port # as
Trigger port #
, please leave
Open Port #
as blank.
Select the
Open Protocol
Click
Save/Apply
Page 35 / 92
X5668 / X5668U
User’s Guide
30
Figure 30: Add A Rule Of Port Triggering
DMZ
A DMZ (DeMilitarized Zone) host is a computer on your network that can be accessed
from the Internet. The de-militarised zone (DMZ) is for forwarding IP packets from the
remote parties that are not fixed to any of the applications configured in the virtual
server. These packets are forwarded to a designated DMZ host device. A DMZ is
often used to host Web servers, FTP servers etc that need to be accessible from the
Internet
Figure 31: Add A Rule Of Port Triggering
Global Setting
Enter the
DMZ Host IP address
Click
Save/Apply

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top