Page 36 / 93 Scroll up to view Page 31 - 35
32
D-Link DIR-600L User Manual
Section 3 - Configuration
Port Forwarding
This will allow you to open a single port or a range of ports.
Check the box to enabled the rule.
Enter a name for the rule.
You may select a pre-defined rule from the drop-down menu.
Select a rule and then click
<<.
to populate the required fields.
Enter the IP address of the computer on your local network
that you want to allow the incoming service to.
Enter the port or range of ports that you want to open. If you
want to open one port, enter the same port in both boxes.
In most cases the Public and Private ports will be exactly the
same.
Select
TCP
,
UDP
, or
Any
.
Enable:
Name:
Application
Name:
IP Address:
Start Port/
End Port:
Traffic Type:
Page 37 / 93
33
D-Link DIR-600L User Manual
Section 3 - Configuration
Application Rules
Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others.
These applications may have difficulties working through NAT (Network Address Translation). Special Applications makes
some of these applications work with the DIR-600L. If you need to run applications that require multiple connections, specify
the port normally associated with an application in the “Trigger” field, select the protocol type as TCP or UDP, then enter the
firewall (public) ports associated with the trigger port to open them for inbound traffic.
The DIR-600L provides some predefined applications in the table on the bottom of the web page. Select the application you
want to use and enable it.
Check the box to enable the rule.
Enter a name for the rule.
You may select a pre-defined rule from the drop-down
menu. Select and click << to populate the required
fields.
This is the port used to trigger the application. It can
be either a single port or a range of ports.
This is the port number on the Internet side that will
be used to access the application. You may define a
single port or a range of ports. You can use a comma
to add multiple ports or port ranges.
Select
TCP
,
UDP
, or
Any
.
Enable:
Name:
Application:
Trigger:
Firewall:
Traffic Type:
Page 38 / 93
34
D-Link DIR-600L User Manual
Section 3 - Configuration
MAC Filtering
Select
Turn.MAC.Filtering.OFF
,
Turn.MAC.Filtering.ON.and.
ALLOW.computers.listed.to.access.the.network
, or
Turn.
MAC.Filtering.ON.and.DENY.computers.listed.to.access.
the.network
.
Enter the MAC address you would like to filter. To find the
MAC address on a computer, please refer to the Networking
Basics section in this manual.
Select a DHCP client from the drop-down menu and click the
<<
button to populate the required fields.
The schedule of time when the network filter will be enabled.
The schedule may be set to
Always
, which will allow the
particular service to always be enabled. You can create your
own times by clicking
.Add.New
.
Configure MAC
Filter:
MAC Address:
DHCP Client
List:
Schedule:
Use MAC Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses from accessing the Network.
You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to
the Router.
Page 39 / 93
35
D-Link DIR-600L User Manual
Section 3 - Configuration
Traffic Control
Traffic control can be used to distribute download bandwidth automatically
according to the requirements of the users, and
the users also can setup manually.
Select this function to control the access bandwidth of
computer in LAN.
All the computers in LAN will be distributed bandwidth
equally.
Manually enter the download bandwidth.
Manually enter the upload bandwidth.
When the option Automatic Distribute Bandwidth is
unchecked, you can control the access bandwidth of
the specific device on your network.
Enable Traffic Control:
Automatic Distribute
Bandwidth:
Key in download
bandwidth manually:
Key in upload
bandwidth manually:
Traffic Control Rules:
Page 40 / 93
36
D-Link DIR-600L User Manual
Section 3 - Configuration
Firewall & DMZ
This section will allow you to set up a DMZ host and to set up firewall rules.
Enable this feature to protect your network from certain kinds
of “spoofing” attacks.
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state
per session. It validates that the traffic passing through the
session conforms to the protocol.
Check to enable DMZ.
Enter the IP address of the computer you would like to open all
ports to. You may enter the IP address of the computer/device
you want to open all ports to or select it from the drop-down
menu and click
<<
.
Allows application that uses Real Time Streaming Protocol to
receive streaming media from the Internet. QuickTime and Real
Player are some of the common applications using this protocol.
Enter a name for the firewall rule.
Select to
Allow
or
Deny
transport of the data packets according
to the criteria defined in the rule.
The Source/Destination is the TCP/UDP port on either the LAN
or WAN side.
Click
Add.New
to access the Schedules window. Refer to
Maintenance.
>
Schedules
for more information.
Enter a beginning and ending IP address.
Select the transport protocol that will be used for the filter rule.
Enter the desired port range for the filter rule.
Anti-Spoof
Checking:
Enable SPI:
Enable DMZ Host:
DMZ IP Address:
RTSP:
Name:
Action:
Source/Dest:
Schedule:
IP Address:
Protocol:
Port Range:

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top