Page 101 / 198 Scroll up to view Page 96 - 100
FiOS Router User Manual
02/11/09
101
© 2008 Verizon. All Rights Reserved.
To temporarily disable an access control, clear the check box next to the
s
service name.
To reinstate the restriction at a later time, select the check box next to the
s
service name.
To remove an access restriction from the Access Control table, click
s
Remove
for the service. The service will be removed from the Access Control table.
6.4
Port Forwarding
In its default state, the FiOS Router blocks all external users from connecting to
or communicating with the network, making it safe from hackers who may try to
intrude on the network and damage it. However, the network can be exposed to
the Internet in certain limited and controlled ways to enable some applications
to work from the local network (game, voice, and chat applications, for example)
and to enable Internet access to servers in the network. Port forwarding
(sometimes referred to as local servers) supports both of these functions.
To grant Internet users access to servers inside the local network, each service
provided, as well as the computer providing it, must be identified. To do this:
Select
1.
Port Forwarding
from the left side of any Security screen. The “Port
Forwarding” screen appears.
Page 102 / 198
Configuring Security Settings
6.4
Port Forwarding
6
102
© 2008 Verizon. All Rights Reserved.
Click
2.
Add
. The “Add Port Forwarding Rule” screen appears.
Enter the local IP address or the host name of the computer providing the
3.
service in the “Networked Computer/Device” text box. Note that only one local
network computer can be assigned to provide a specific service or application.
Select the Internet protocol to be provided from the “Protocol” drop-down
4.
list. To see all options, select
Show All Services
.
To select a port to forward communications to (this is optional), select
5.
Specify
from the “Forward to Port” drop-down list, then, in the text box
that appears, enter the port number. If no port is identified, select
Same as
Incoming Port
.
If this port will be active all the time, select
6.
Always
from the “When should this
rule occur?” drop-down list. If the rule will only be active at certain times, select
Specify Schedule
and click
Add
. Then, add a schedule rule (for more details
about schedule rules, see the “Advanced Settings” chapter of this manual).
Click
7.
Apply
to save the changes.
How many computers can use a service or play a game simultaneously? The
answer may be a bit confusing. All the computers on the network can behave
as clients and use a specific service simultaneously. Being a client means the
computer within the network initiates the connection; for example, a computer
on the network can open an FTP connection with an FTP server on the Internet.
But only one computer on the network can operate as a server and respond to
requests from computers on the Internet (outside the local network).
Page 103 / 198
FiOS Router User Manual
02/11/09
103
© 2008 Verizon. All Rights Reserved.
6.5
DMZ Host
The DMZ (De-Militarized Zone) host feature allows one device on the network to
operate outside the firewall. Designate a DMZ host:
To use an Internet service, such as an online game or video-conferencing
s
program, not present in the Port Forwarding list and for which no port range
information is available.
To expose one computer to all services without restriction or security.
s
WARNING!
A DMZ host is not protected by the firewall and may be vulnerable
to attack. Designating a DMZ host may also put other computers in the local
network at risk. When designating a DMZ host, consider the security implications
and protect it if necessary.
To designate a local computer as a DMZ host:
Select
1.
DMZ Host
from the left side of any Security screen. The “DMZ Host”
screen appears.
Click in the “DMZ Host IP Address” check box, then enter the IP address of
2.
the computer to be designated as a DMZ host. Note that only one network
computer can be a DMZ host at any time.
Click
3.
Apply
.
Click in the “DMZ Host IP Address” check box again to disable the DMZ host.
Page 104 / 198
Configuring Security Settings
6.6
Port Triggering
6
104
© 2008 Verizon. All Rights Reserved.
6.6
Port Triggering
Port triggering can be used for dynamic port forwarding configuration. By
setting port triggering rules, inbound traffic is allowed to arrive at a specific
network host using ports different than those used for the outbound traffic. The
outbound traffic triggers which ports inbound traffic is directed.
For example, a gaming server is accessed using UDP protocol on port 2222. The
gaming server responds by connecting the user using UDP on port 3333 when
starting gaming sessions. In this case, port triggering must be used, since it
conflicts with the following default firewall settings:
The firewall blocks inbound traffic by default.
s
The server replies to the FiOS Router’s IP, and the connection is not sent back
s
to the host, since it is not part of a session.
To resolve the conflict, a port triggering entry must be defined, which allows
inbound traffic on UDP port 3333, only after a network host generated traffic
to UDP port 2222. This results in accepting the inbound traffic from the gaming
server, and sending it back to the network host which originated the outgoing
traffic to UDP port 2222.
To use port triggering:
Select
1.
Port Triggering
from the left side of any Security screen. The “Port
Triggering” screen appears.
Select either “Specify Protocol” or “Show All Services” from the drop-down list
2.
next to “Add.”
Page 105 / 198
FiOS Router User Manual
02/11/09
105
© 2008 Verizon. All Rights Reserved.
If Show All Services is selected in step 2, select a Service from the list. The
3.
service is added to the Port Triggering screen as an active protocol.
If
Specify Protocol is selected in step 2, the “Edit Port Triggering Rule” screen
4.
appears. Enter a service name in the appropriate text box, then configure its
inbound and outbound trigger ports by clicking the appropriate links..
6.7
Remote Administration
The FiOS Router can be accessed and controlled not only from within the local
network, but also from the Internet using remote adminstration.
To access, select
Remote Administration
from the left side of any Security
screen. The “Remote Administration” screen appears.
6.7a
Telnet
Telnet is used to create a command-line session and gain access to all system
settings and parameters using a text-based terminal. Select the Telnet port to be
used by clicking in the appropriate check box, then click
Apply
.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top