Page 96 / 182 Scroll up to view Page 91 - 95
94
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
Special Applications
Special Applications (port triggering) let you choose specific ports to be
open for specific applications to work properly with the Network Address
Translation (NAT) feature of the Router.
Figure 71
Special Applications Screen
A list of popular applications has been included to choose from. Select
the application from the
Popular Applications
drop-down menu. Then
select the row that you want to copy the settings to from the
Copy To
drop-down menu, and click
Copy To
. The settings will be transferred to
the row that you specified. Click
Apply
to save the setting for that
application.
If your application is not listed, you will need to check with the
application vendor to determine which ports need to be configured. You
can manually enter the port information into the Router. To manually
enter the port information:
1
Specify the trigger port (the one used by the application when it is
initialized) in the
Trigger Port
column, and specify whether the trigger is
TCP or UDP.
2
Specify the Public Ports used by the application, that will need to be
opened up in the firewall for the application to work properly. Also
specify whether these ports are TCP or UDP. Note that the range of the
trigger port is from 1 to 65535. You can enter the port number as one
single port, or in range, use comma to separate different entries.
3
Check the
Enabled
checkbox, then click
Apply.
Downloaded from
www.Manualslib.com
manuals search engine
Page 97 / 182
Firewall
95
Virtual Servers
The Virtual servers feature allows you to route external (Internet) calls for
services such as a web server (port 80), FTP server (Port 21), or other
applications through your Router to your internal network. Since your
internal computers are protected by a firewall, machines from the
Internet cannot get to them because they cannot be 'seen'.
If you need to configure the Virtual Server function for a specific
application, you will need to contact the application vendor to find out
which port settings you need.
The maximum number of virtual servers that can be configured is 20.
Figure 72
Virtual Servers Screen
A list of popular servers has been included to choose from. Select the
server from the
Popular servers
drop-down menu. Then click
Add
, your
selection will be added to the table.
If the server that you want to use is not listed in the drop-down menu,
you can manually add the virtual server to the table. To manually
configure your virtual servers:
1
Enter the IP address, and the description in the spaces provided for the
internal machine.
2
Select the protocol type (TCP, UDP, or both TCP and UDP) from the
drop-down menu.
Downloaded from
www.Manualslib.com
manuals search engine
Page 98 / 182
96
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
3
Specify the public port that will be seen by clients on the Internet, and the
LAN port which the traffic will be routed to.
4
You can enable or disable each Virtual Server entry by checking or
unchecking the appropriate
Enabled
checkbox.
5
Click
Apply
to save the changes for each Virtual Server entry.
DMZ
If you have a client PC that cannot run an Internet application properly
from behind the firewall, you can open the client up to unrestricted
two-way Internet access. This may be necessary if the NAT feature is
causing problems with an application such as a game or video
conferencing application.
Figure 73
DMZ Screen
Use this feature on a temporary basis. The computer in the DMZ is not
protected from hacker attacks.
Check the
Enable DMZ
box, the IP Address of Virtual DMZ Host will
appear.
1
Enter the last digits of the LAN IP address in the
Client PC IP Address
field.
Enter the IP address (if known) that will be accessing the DMZ PC into the
Public IP Address
field, so that only the computer on the Internet at this
address can access the DMZ PC without firewall protection. If the IP
Downloaded from
www.Manualslib.com
manuals search engine
Page 99 / 182
Firewall
97
address is not known, or if more than one PC on the Internet will need to
access the DMZ PC, then set the
Public IP Address
to
0.0.0.0
.
In the default setting, (line 1) refer to
Figure 73
, Public IP address is set to
0.0.0.0 and it is automatically transformed by default WAN IP. We only
allow one DMZ server to be accessed by public IPs (Many to 1 NAT). If you
have more than one DMZ server, you have to set a second WAN IP in line
2 and define which IP address of DMZ server you would like to set in the
Client PC IP
address
. For this Router, only 1 to 1 NAT function is allowed.
2
Click
Apply
.
PC Privileges
The Router can be configured to restrict access to the Internet, email or
other network services at specific days and times. Restriction can be set
for a single computer, a range of computers, or multiple computers.
You can define the traffic type permitted or not-permitted to the Internet.
Note that this function requires time-scheduling to be applied to access
control, you will need to create schedule rules first and then use PC
Privileges.
Figure 74
PC Privileges Screen
1
Select one option from filtering function:
All PCs have access to the Internet: selecting this mode means that all
clients have full access to Internet.
PCs access authorised services only: selecting this mode means clients
can only access authorised or limited services.
2
Click
Add PC
(refer to
Figure 75
).
Downloaded from
www.Manualslib.com
manuals search engine
Page 100 / 182
98
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
To edit or delete specific existing filtering rules, click on
Edit
or
Delete
for
the appropriate filtering rule.
Figure 75
PC Privileges Add PC Screen
1
Enter a description in the
Client PC Description
field, and the IP address or
IP address range into the
Client PC IP Address
fields.
2
To bypass the URL Filter, check the corresponding
Bypass
checkbox. If you
check this option, then the Web sites and keywords defined in this screen
will not be filtered out.
3
Select the services to be blocked. A list of popular services is listed on this
screen, to block a particular service, check the appropriate
Blocking
checkbox.
If the service to be restricted is not listed here, you can enter a custom
range of ports at the bottom of the screen, under
User Defined Blocked
Ports.
4
If you want the restriction to apply only at certain times, select the
schedule rule to apply from the
Schedule Rule
drop-down menu.
Note that schedule rules are defined on the Schedule Rules screen
(see
page 99
).
5
Click
Apply
to add the settings.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top