Page 66 / 130 Scroll up to view Page 61 - 65
Chapter 3
Configuring the DOCSIS Residential Gateway
48
4042831 Rev A
Setup Advanced Settings - Port Triggers Page
The following illustration is an example of the Setup Advanced Settings - Port
Triggers page.
Setup Advanced Settings - Port Triggers Page Description
Use this link to enter and enable the port forwarding trigger and target range start
and end ports along with protocol information in the appropriate fields. The
following example illustrates how to use the port triggering feature to configure the
Microsoft X-Box Online Live for Internet gaming.
Note:
For most widely used applications (including Microsoft X-Box Online Live),
the built-in firewall automatically maps and opens ports required for that
application while the application is in use.
1
In the first row, enter
88
in both Start Port and End Port fields.
2
In the same row, select
UDP
from the drop-down list in the Protocol field, and
then select the box in the
Enable
field.
3
In the second row, enter
3074
in both Start Port and End Port fields.
4
In the same row as the second entry, select
Both
, and then select the box in the
Enable field.
5
Click
Apply
to apply and save your new port forwarding settings.
Page 67 / 130
Configure Advanced Settings
4042831 Rev A
49
Configuring the DMZ Host
Use the Setup Advanced Settings - DMZ Host page to configure an IP address that is
visible to the WAN. DMZ hosting is commonly referred to as ―exposed host,‖ and
allows you to specify the ―default‖ recipient of WAN traffic that Network Address
Translation (NAT) is unable to translate to a known local PC. DMZ allows one IP
address to be unprotected while others remain protected.
Note:
If you are not familiar with the advanced settings detailed in this section,
contact your service provider before you attempt to change any of the residential
gateway default advanced DMZ host settings.
Click
DMZ Host
in the Advanced Settings section of the Setup page to access the
Setup Advanced Settings - DMZ Host page.
Setup Advanced Settings - DMZ Host Page
The following illustration is an example of the Setup Advanced Settings - DMZ Host
page.
Setup Advanced Settings - DMZ Host Page Description
Use this link to place a Private LAN IP device, for example, an FTP, Mail, or web
server directly on the Internet (bypassing the firewall). You set the server with a
fixed IP address as a DMZ Host by entering its IP address in the DMZ Address field.
Make sure the IP address used is not in the range of addresses delivered by the built-
in DHCP server. After setting up a DMZ Host, all ports on this device are open to
the Internet. You may configure only one PC to be the DMZ host. DMZ is generally
used for PCs
running ―problem‖ applications that use random port numbers and do
not function correctly with the specific port triggers or port forwarding setups
described earlier in this guide. After entering a DMZ Address, click
Apply
to apply
and save your new DMZ Host setting.
Page 68 / 130
Chapter 3
Configuring the DOCSIS Residential Gateway
50
4042831 Rev A
Configuring VPN Termination
Use the Setup Advanced Settings - VPN Termination page to configure VPN
protocols and manage VPN tunnels. A VPN is a connection between two endpoints
in different networks that allows private data to be sent securely and transparently
over public networks or other private networks. With a VPN, you can send data
securely between these two locations or networks. This is accomplished by creating a
"VPN tunnel." A VPN tunnel connects the two PCs or networks and allows data to
be transmitted over the Internet as if it were still within those networks. The VPN
tunnel uses IPsec (Internet Protocol security) to encrypt the data sent between the
two networks and encapsulate the data within a normal Ethernet/IP frame so as to
transport the private network securely and seamlessly through other public or
private networks.
A VPN provides a cost-effective and more secure alternative to using a private,
dedicated, leased line for a private network. Using industry standard encryption and
authentication techniques, an Internet Protocol Security (IPsec) VPN creates a secure
connection that operates as if you were directly connected to your local network.
For example, a VPN allows users to sit at home and connect to his/her employer's
corporate network and receive an IP address in their private network just as though
they were sitting in their office connected to their corporate LAN.
Another advantage of a VPN network is that it all proprietary Microsoft Windows-
based networking protocols can pass through the router using the VPN tunnel to
access corporate shared network drives.
Note:
If you are not familiar with the advanced settings detailed in this section,
contact your service provider before you attempt to change any of the wireless home
gateway defaults advanced VPN Termination settings.
Click
VPN Termination
in the Advanced Settings section of the Setup page to access
the Setup Advanced Settings - VPN Termination - Status page. The VPN
Termination - Status page allows you to create, configure, and control IPsec VPN
tunnels.
Page 69 / 130
Configure Advanced Settings
4042831 Rev A
51
Setup Advanced Settings - VPN Termination - Blank Status Page
The following illustration is an example of a blank Setup Advanced Settings - VPN
Termination - Status page. No VPN tunnels are configured.
Setup Advanced Settings - VPN Termination - Status Page with VPN Tunnel Configured
The following illustration is an example of the Setup Advanced Settings - VPN
Termination - Status page with a VPN tunnel configured.
Setup Advanced Settings - VPN Termination - Status Page Description
This section describes the section headings and field descriptions of the Setup
Advanced Settings - VPN Termination - Status page. This page allows you to create,
configure, and control IPsec VPN tunnels.
Note:
You can set up and mange up to 50 different VPN tunnels.
Page 70 / 130
Chapter 3
Configuring the DOCSIS Residential Gateway
52
4042831 Rev A
Field Name
Description
IPsec Endpoint
Enables/disables the IPsec endpoint mode.
Name
Displays the user-defined tunnel name entered from the VPN Setup
page.
Status
Displays the current connection state (Connected/NOT Connected).
Control
Displays one of the following three keys based on the current tunnel
enable and connection state:
Enable
Connect
Endpoint disabled
Configure
Displays Edit or Delete keys used for settings management.
Add New Tunnel
Allows you to create a new tunnel configuration. When you click
Add
New Tunnel
, the
VPN Setup
page opens.
Event Log
Allows you to access the Event Log page. The Event Log page shows a
history of VPN connections and activity in chronological order and also
displays the IP address of both endpoints on the tunnel (local and
remote).
Note:
On the Event Log page, pressing the
Refresh
key updates the
Event Log table to show any changes since the page was loaded. Pressing
the
Clear
key clears the log table of its current contents and only the most
recent data appears.

Rate

4 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top