Page 56 / 113 Scroll up to view Page 51 - 55
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
56
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
56
HITRON CGN2 USER’S GUIDE
4.1.6
PORT FORWARDING
Port forwarding allows a computer on your LAN to receive specific communications
from the WAN. Typically, this is used to allow certain applications (such as gaming)
through the firewall, for a specific computer on the LAN. Port forwarding is also
commonly used for running a public HTTP server from a private network.
You can set up a port forwarding rule for each application for which you want to open
ports in the firewall. When the CGN2 receives incoming traffic from the WAN with a
destination port that matches a port forwarding rule, it forwards the traffic to the LAN
IP address and port number specified in the port forwarding rule.
NOTE:
For information on the ports you need to open for a particular application,
consult that application’s documentation.
4.1.7
PORT TRIGGERING
Port triggering is a means of automating port forwarding. The CGN2 scans outgoing
traffic (from the LAN to the WAN) to see if any of the traffic’s destination ports match
those specified in the port triggering rules you configure. If any of the ports match, the
CGN2 automatically opens the incoming ports specified in the rule, in anticipation of
incoming traffic.
4.1.8
DMZ
In networking, the De-Militarized Zone (DMZ) is a part of your LAN that has been
isolated from the rest of the LAN, and opened up to the WAN. The term comes from
the military designation for a piece of territory, usually located between two opposing
forces, that is isolated from both and occupied by neither.
4.2
THE FIREWALL OPTIONS SCREEN
Use this screen to turn firewall features on or off. You can enable or disable the
CGN2’s intrusion detection system, and allow or prevent responses to ICMP requests
from the WAN.
Click
Firewall
>
Firewall Options
. The following screen displays.
Page 57 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
57
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
57
HITRON CGN2 USER’S GUIDE
Figure 16:
The Firewall > Firewall Options Screen
The following table describes the labels in this screen.
4.3
THE FILTER SETTING SCREEN
Use this screen to configure Media Access Control (MAC) address filtering on the
LAN, and to configure IP filtering.
Table 16:
The Firewall > Firewall Options Screen
Firewall
Select this to turn the firewall on.
Deselect this to turn the firewall off.
NOTE:
It is strongly recommended that you enable the
CGN2's firewall unless LAN protection is
provided by another device or software.
Intrusion Detection
System
Select this to turn the intrusion detection system off.
Deselect this to turn the intrusion detection system
on.
Ping on WAN Interface
Select this to prevent responses to ICMP requests
originating from the WAN.
Select this to allow responses to ICMP requests
originating from the WAN.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 58 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
58
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
58
HITRON CGN2 USER’S GUIDE
NOTE:
To configure MAC address filtering on the wireless network, see The Access
Control Screen on page 93.
You can set the CGN2 to allow only certain devices to access the CGN2 and the
network, or to deny certain devices access.
NOTE:
To see a list of all the computers connected to the CGN2 on the LAN, click
the
Connected Computers
button in the
Firewall
>
IP Filtering
,
Forwarding
,
Port Triggering
or
Firewall Options
screens.
You can turn IP filtering on or off, and configure new and existing IP filtering rules.
Click
Firewall
>
Filter Setting
. The following screen displays.
Page 59 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
59
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
59
HITRON CGN2 USER’S GUIDE
Figure 17:
The Firewall > Filter Setting Screen
Page 60 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
60
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
60
HITRON CGN2 USER’S GUIDE
The following table describes the labels in this screen.
Table 17:
The Firewall > Filter Setting Screen
MAC Filter Options
MAC Filter Options
Use this field to control whether the CGN2 performs MAC
filtering.
Select
Allow-All
to turn MAC filtering off. All devices
may access the CGN2 and the network.
Select
Allow
to permit only devices with the MAC
addresses you set up in the
Allow Table
to access the
CGN2 and the network. All other devices are denied
access.
Select
Deny
to permit all devices except those with the
MAC addresses you set up in the
Deny Table
to
access the CGN2 and the network. The specified
devices are denied access.
Allow Table (up to 16 Items)
#
This displays the index number assigned to the permitted
device.
Device Name
This displays the name you gave to the permitted device.
MAC Address
This displays the MAC address of the permitted device.
Delete
Select a permitted device’s radio button (
) and click this
to remove the device from the list. The device may no
longer access the CGN2 and the network.
NOTE:
Make sure you do not delete your management
computer from the list; if you do so, you will need
to log back in from another computer, or reset the
CGN2.
Deny Table (up to 16 Items)
#
This displays the index number assigned to the denied
device.
Device Name
This displays the name you gave to the denied device.
MAC Address
This displays the MAC address of the denied device.
Delete
Select a denied device’s radio button (
) and click this to
remove the device from the list. The device may now
access the CGN2 and the network.
Auto-Learned LAN Devices

Rate

3.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top