Page 41 / 117 Scroll up to view Page 36 - 40
Page 41
501 SE Columbia Shores Boulevard, Suite 500, Vancouver, Washington 98661, USA
l
+1 360 859 1780
SmartRG Inc. Propriety and Confidential. All Rights Reserved. Copyright © 2014
smartrg.com
Field Name
Description
Use Interface
Select the WAN interface that this NAT rule will apply to.
Select a Service
Select from a list of common applications that typically require port forwards in place.
The port ranges and protocol fields will be pre-populated
Custom Service
If your application does not appear in the preceding drop-down list you may manually en-
ter a unique name for the application.
Server IP Address
IP address of the LAN client in which the service has been hosted.
External Port Start
External Port to start with
External Port End
External Port to end with
Protocol
Protocol used Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) or TCP/UDP
Internal Port Start
Internal Port to start with
Internal Port End
Internal Port to end with
The individual fields on this screen are defined as follows:
Port Triggering
Some applications require that specific ports in the gateway’s firewall be opened for access by remote parties. Port Trigger dy
-
namically opens up the ‘Open Ports’ in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote
party using the
Triggering Ports
. The Router allows the remote party from the WAN side to establish new connections back to the
application on the LAN side using the
Open Ports
.
After selecting
Advanced Setup -> NAT -> Port Triggering
from the left navigation bar, click the Add button. Customize the fields
as needed for the firewall pinholes you wish to establish.
A maximum 96 entries can be configured.
Click
Apply/Save
to commit your changes.
Page 42 / 117
Page 42
501 SE Columbia Shores Boulevard, Suite 500, Vancouver, Washington 98661, USA
l
+1 360 859 1780
SmartRG Inc. Propriety and Confidential. All Rights Reserved. Copyright © 2014
smartrg.com
Field Name
Description
Use Interface
Select the interface over which the port triggering rule will apply.
Select an Application
Choose from this list of applications which commonly require a Port trigger entry.
Custom Application
A free form text field. Enter a unique name for the application for which you are creating a
Port Trigger entry
Trigger Port Start
[1-65535] An outgoing trigger port number. Set the beginning of the range of available ports.
Trigger Port End
[1-65535] An outgoing trigger port number. Set the end of the range of available ports.
Trigger Protocol
[TCP, UDP, TCP/UDP] Select the protocol required by the application that will be using the
ports in the specified range.
Open Port Start
[1-65535] An incoming port number. Set the beginning of the range of available ports.
Open Port End
[1-65535] An incoming port number. Set the end of the range of available ports.
Open Protocol
[TCP, UDP
, TCP/UDP] Select the protocol from the drop down list.
The individual fields on this screen are defined as follows:
Page 43 / 117
Page 43
501 SE Columbia Shores Boulevard, Suite 500, Vancouver, Washington 98661, USA
l
+1 360 859 1780
SmartRG Inc. Propriety and Confidential. All Rights Reserved. Copyright © 2014
smartrg.com
DMZ Host
The Broadband Router will forward IP packets from the WAN that do not belong to any of the applications configured in the Virtual
Servers table to the DMZ host computer. If it is desired to route all internet traffic with no filtering or security to a specific LAN
device, add the IP address of that device to this field.
After selecting
Advanced Setup -> NAT -> DMZ Host
from the left navigation bar, enter the DMZ Host IP Address.
Click
Apply/Save
to commit the new or changed address.
Page 44 / 117
Page 44
501 SE Columbia Shores Boulevard, Suite 500, Vancouver, Washington 98661, USA
l
+1 360 859 1780
SmartRG Inc. Propriety and Confidential. All Rights Reserved. Copyright © 2014
smartrg.com
Field Name
Description
Filter Name
A free form text field. Give your filter an intuitive name.
IP Version
Version IPv4 is selected by default. IPV6 can be alternately selected. For the filter to be
IPV6 configured and effective requires the gateway be installed on a network that is either
a pure IPV6 network having that protocol enabled or it is both IPV4 and IPV6 dual protocol
enabled/configured. Choosing IPV6 means both the Source and Destination IP address as
described below must be specified in IPV6 format (e.g. the following is an IPV6 compliant,
hexadecimal address.
2001:0DB8:AC10:FE01:0000:0000:0000:0001).
Protocol
[TCP/UDP
,TCP, UDP
, or ICMP]
Sets the protocol profile for the filter you are defining.
TCP/
UDP is most commonly used.
Source IP address [/prefix length]
Enter the source IP address of a LAN side host for which you wish to filter/block it’s outgoing
traffic for the specified protocol(s).
The individual fields on this screen are defined as follows:
SECURITY
IP Filtering
Outgoing
Add an Outgoing filter when refusal of data from the LAN to the WAN is desired.
After selecting
Advanced Setup -> Security -> IP Filtering -> Outgoing
from the left navigation bar, click the Add button. The follow-
ing screen will appear to facilitate the filtering you desire. Click Apply/Save to commit the completed entry.
Page 45 / 117
Page 45
501 SE Columbia Shores Boulevard, Suite 500, Vancouver, Washington 98661, USA
l
+1 360 859 1780
SmartRG Inc. Propriety and Confidential. All Rights Reserved. Copyright © 2014
smartrg.com
NOTE: The address specified here can be a particular address or a block of IP address on a
given network subnet. This is done through appending the address with the routing “/prefix”
length decimal value (preceded with the slash) associated. Use of a valid decimal routing
prefix for defining the subnet mask per CIDR notation is required).
Source Port (port or port:port)
Set the outgoing host port (or range of ports) for the above host (or range of hosts defined
by optional routing “/prefix” subnet mask) to define the ports profile for which egress traf
-
fic will be filtered from reaching the specified destination(s).
Destination IP address
Enter the source IP address of a LAN side host for which you wish to filter/block it’s outgo
-
ing traffic for the specified protocol(s).
Note: The address specified here can be a particular address or a block of IP address on
a given network subnet. This is done through appending the address with the routing “/
prefix” length decimal value (preceded with the slash) associated. Use of a valid decimal
routing prefix for defining the subnet mask per CIDR notation is required).
Destination Port (port or port:port)
Set the destination host port (or range of ports) for the above host (or range of hosts de-
fined by optional routing “/prefix” subnet mask) to define the destination ports profile for
which the filtered host egress traffic will be filtered from reaching the otherwise intended
destination(s) (e.g. to block the traffic to those ports on, say,
a computer external to the
local network.)
Incoming
Add an Incoming filter when refusal of data from the WAN to the LAN is desired.
After selecting
Advanced Setup -> Security -> IP Filtering -> Incoming
click the
Add
button. The following screen will appear to
facilitate the filtering you desire. Click
Apply/Save
to commit the completed entry.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top