Page 51 / 128 Scroll up to view Page 46 - 50
D-Link DSL-2760U USER’S MANUAL
51
NAT – Port Triggering
Some applications require that specific ports in the Router's firewall be opened for access by the remote parties. Port Trigger dynamically opens up the 'Open
Ports' in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote party using the 'Triggering Ports'. The Router allows the remote
party from the WAN side to establish new connections back to the application on the LAN side using the 'Open Ports'. A maximum 32 entries can be configured.
To Add a Port Triggering Rule click the
Add
button.
Page 52 / 128
D-Link DSL-2760U USER’S MANUAL
52
Some applications such as games, video conferencing, remote access
applications and others require that specific ports in the Router's firewall be
opened for access by the applications.
You can configure the port settings from this screen by selecting an existing
application or creating your own (Custom application) and click
Save/Apply
to
add it.
A maximum number of 32 entries can be configured.
View the newly added rule.
Page 53 / 128
D-Link DSL-2760U USER’S MANUAL
53
NAT – DMZ Host
The DSL router will forward IP packets from the WAN that do not belong to any of the applications configured in the Virtual Servers table to the DMZ host
computer.
Enter the computer's IP address and click
Save/Apply
to activate the DMZ
host.
Clear the IP address field and click
Save/Apply
to deactivate the DMZ host.
NAT – ALG
ALG, known as Application Level Gateway or Application Layer Gateway, consists of a security component that augments a firewall or NAT employed in a
computer network. The main function for ALG on this gateway is to allow NAT traversal to SIP applications.
Tick the
SIP Enabled
check box to enable ALG on this router and click
Save/Apply
.
Page 54 / 128
D-Link DSL-2760U USER’S MANUAL
54
Security – IP Filtering
When a computer connects to the Internet, it begins communicating with other networking device and computers and by the norm is taking a risk. Internet
Security is the method to safely secure a local network from unwanted intrusions from the Internet and also to the Internet. This page allow for two main security
methods that can be used. The first method is to block any node and ONLY allowing certain users to connect through this router. The second method is to allow
any node and ONLY blocking certain users to connect through this router.
The basic firewall of this router should be sufficient enough to keep unwanted guests from browsing your network from the Internet. This page will add to this
already applied security feature
IP Filtering - Outgoing
This window allows you to create a filter rule to block outgoing IP traffic by
specifying a filter name and at least one condition on this window. All of the
specified conditions in this filter rule must be satisfied for the rule to take effect.
Filters are used to allow or deny LAN or WAN users from accessing the Internet
or your internal network. Click the
Change Policy
to change between
BLOCK
and
ACCEPT
the rules.
If you are setting up the outgoing IP filtering, click the
Add
button.
IP Filtering – Incoming
The Inbound Filter allows you to create a filter rule to allow incoming IP traffic
by specifying a filter name and at least one condition on this window. All of the
specified conditions in this filter rule must be satisfied for the rule to take effect.
By default, all incoming IP traffic from the Internet is blocked when the firewall is
enabled. Click the
Change Policy
to change between
BLOCK
and
ACCEPT
the rules.
If you are setting up the incoming IP filtering, click the
Add
button.
Page 55 / 128
D-Link DSL-2760U USER’S MANUAL
55
Filter Name:
Protocol:
Source IP Address:
Source Subnet
Mask:
Source Port:
Destination IP
Address:
Destination Subnet
Mask:
Destination Port:
Outgoing Rule - Add
Enter a name for the new rule here.
Select the appropriate protocol used here.
Enter the Source IP address here.
Enter the Source Subnet Mask here.
Enter the Source port number here.
Enter the Destination IP address here.
Enter the Destination Subnet Mask here.
Enter the Destination port number here.
Click
Apply/Save
to add the rule.
Filter Name:
Protocol:
Source IP Address:
Source Subnet
Mask:
Source Port:
Destination IP
Address:
Destination Subnet
Mask:
Destination Port:
WAN/LAN
Interfaces:
Incoming Rule - Add
Enter a name for the new rule here.
Select the appropriate protocol used here.
Enter the Source IP address here.
Enter the Source Subnet Mask here.
Enter the Source port number here.
Enter the Destination IP address here.
Enter the Destination Subnet Mask here.
Enter the Destination port number here.
Here you can select the appropriate WAN/LAN interface
that this rule will use.
Click
Apply/Save
to add the rule.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top