B
6 • Advanced Pages
38
Advanced DMZ Host Page
Specify the default recipient of WAN traffic that NAT is unable to translate to a known
local PC. The DMZ (De-militarized Zone) is a computer or small sub-network located
outside the firewall, between the trusted internal private LAN and the untrusted public
Internet, that prevents direct access by outside users to private data.
For example, you can set up a web server on a DMZ computer to enable outside users
to access your website without exposing confidential data on your network.
A DMZ is also useful to play interactive games that may have a problem running through
a firewall. You can leave a computer used for gaming only exposed to the Internet while
protecting the rest of your network.
You can configure one PC to be the DMZ host. This setting is generally used for PCs
using problem applications that use random port numbers and do not function correctly
with specific port triggers or the port forwarding setups. If you set up a PC as a DMZ
Host, set this back to zero when you are finished with the needed application, since this
PC will be effectively exposed to the public Internet, though still protected from Denial of
Service (DoS) attacks via the Firewall.
Setting Up the DMZ Host
1.
Enter the computer’s IP address.
2.
Click
Apply
to activate the selected computer as the DMZ host.
Advanced Routing Information Protocol Setup
Page
Configure Routing Information Protocol (RIP) parameters related to authentication,
destination IP address/subnet mask, and reporting intervals. RIP automatically identifies
and uses the best and quickest route to any given destination address. The RIP protocol
requires negotiation from both sides (CMRG and CMTS) of the network. The ISP usually
sets this up to match their CMTS settings with the configuration in the CMRG.
Note:
RIP messaging is sent upstream only when running in Static IP
Addressing mode on the Basic Setup page. You must enable Static IP
Addressing and then set the WAN IP network information! RIP is normally
a function that is tightly controlled via the ISP. RIP Authentication Keys
and IDs are normally held as secret information from the end user to
prevent unauthorized RIP settings.