Page 36 / 70 Scroll up to view Page 31 - 35
33
Field Descriptions for the Advanced MAC Filtering Page
Field
Description
MAC Addresses
Media Access Control address — a unique set of 12 hexadecimal digits
assigned to a PC during manufacturing.
Setting a MAC Address Filter
1.
Enter the MAC address in the MAC Addresses field for the PC you want to block.
2.
Click
Add MAC Address
.
3.
Repeat above steps for up to twenty MAC addresses.
Advanced Port Filtering Page
This page allows you to define port filters to prevent all devices from sending outgoing
TCP/UDP traffic to the WAN on specific IP port numbers. By specifying a starting and
ending port range, you can determine what TCP/UDP traffic is allowed out to the WAN on
a per-port basis.
Page 37 / 70
34
Note:
The specified port ranges are blocked for ALL PCs, and this
setting is not IP address or MAC address specific. For example, if you
wanted to block all PCs on the private LAN from accessing HTTP sites
(or “web surfing”), you would set the “Start Port” to 80, “End Port” to 80,
“Protocol” to TCP, checkmark Enabled, and then click
Apply.
Field Descriptions for the Advanced Port Filtering Page
Field
Description
Start Port
Start port number.
End Port
End port number.
Protocol
TCP
,
UDP
, or
Both
.
Enabled
Checkmark for each port that you want to activate the IP port
filters.
Delete
Checkmark for each port that you want to remove the IP port
filters.
Advanced Port Forwarding Page
This page allows you to run a publicly accessible server on the LAN by specifying the
mapping of TCP/UDP ports to a local PC. This enables incoming requests on specific
port numbers to reach web servers, FTP servers, mail servers, etc. so that they can be
accessible from the public Internet.
Page 38 / 70
35
The ports used by some common applications are:
HTTP: 80
FTP: 20, 21
Secure Shell: 22
Telnet: 23
SMTP e-mail: 25
SNMP: 161
To map a port, you must enter the range of port numbers that should be forwarded locally
and the IP address to which traffic to those ports should be sent. If only a single port
specification is desired, enter the same port number in the “start” and “end” locations for
that IP address.
Page 39 / 70
36
Advanced Port Triggers Page
This page allows you to configure dynamic triggers to specific devices on the LAN. This
allows for special applications that require specific port numbers with bi-directional traffic
to function properly. Applications such as video conferencing, voice, gaming, and some
messaging program features may require these special settings.
The Advanced Port Triggers are similar to Advanced Port Forwarding except that they
are not static ports held open all the time. When the Configuration Manager detects
outgoing data on a specific IP port number set in the “Trigger Range,” the resulting ports
set in the “Target Range” are opened for incoming (sometimes referred to as
bi-directional ports) data. If no outgoing traffic is detected on the “Trigger Range” ports for
10 minutes, the “Target Range” ports will close. This is a safer method for opening
specific ports for special applications (e.g. video conferencing programs, interactive
gaming, file transfer in chat programs, etc.) because they are dynamically triggered and
not held open constantly or erroneously left open via the router administrator and
exposed for potential hackers to discover.
Field Descriptions for the Advanced Port Triggers Page
Field
Description
Trigger Range
Start Port
End Port
The start port number of the Port Trigger range.
The end port number of the Port Trigger range.
Target Range
Start Port
End Port
The start port number of the Port Trigger range.
The end port number of the Port Trigger range.
Protocol
TCP
,
UDP
, or
Both
.
Enable
Select checkbox to activate the IP port triggers.
Delete
Select checkbox to remove the IP port triggers.
Page 40 / 70
37
Advanced DMZ Host Page
This page allows you to specify the default recipient of WAN traffic that NAT is unable to
translate to a known local PC. The DMZ (De-militarized Zone) hosting (also commonly
referred to as “Exposed Host”) can also be described as a computer or small sub-network
that is located outside the firewall between the trusted internal private LAN and the un-
trusted public Internet. It prevents direct access by outside users to private data.
For example, you can set up a web server on a DMZ computer to enable outside users to
access your website without exposing confidential data on your network.
A DMZ can also be useful to play interactive games that may have a problem running
through a firewall. You can leave a computer used for gaming only exposed to the
Internet while protecting the rest of your network.
You may configure one PC to be the DMZ host. This setting is generally used for PCs
using problem applications that use random port numbers and do not function correctly
with specific port triggers or the port forwarding setups mentioned earlier. If a specific PC
is set as a DMZ Host, remember to set this back to zero when you are finished with the
needed application, since this PC will be effectively exposed to the public Internet, though
still protected from Denial of Service (DoS) attacks via the Firewall.
Setting Up the DMZ Host
1.
Enter the computer’s IP address and select
Enable
checkbox.
2.
Click
Apply
to activate the selected computer as the DMZ host.
Dynamic DNS
This page allows you to provide Internet users with a name (instead of an IP address) to
access your virtual servers. CH6640E/CG6640E supports dynamic DNS service provided
by the provider 'http://www.dyndns.org'. Please register this service at web side of
dyndns.org first.

Rate

124.8 / 5 based on 304 votes.

Popular CBN Inc Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top