Page 66 / 93 Scroll up to view Page 61 - 65
3-32
SECTION 3, CONFIGURATION
Field
Description
DDNS Server
Select the desired DDNS service provider.
User Name
Enter the User Name (up to 30 bytes) provided
by the DDNS provider.
User Password
Enter the Password (up to 30 bytes) provided
by the DDNS provider.
User Password
Confirm
Re-enter the Password provided by the DDNS
provider.
Host Name
Enter a desired Host Name for your WAN IP
Address.
Page 67 / 93
SECTION 3, CONFIGURATION
3-33
Networking - NAT
Network Address Translation (NAT) translates multiple IP addresses
on a private LAN to one public address that is sent out to the Internet
by your ISP. This adds a level of security since the address of a PC
connected to the private LAN is never transmitted on the Internet.
A gaming Demilitarized Zone (DMZ) allows one IP address
(computer or device) to be exposed to the Internet for online game
playing or video conferencing.
To access the screen, click
Networking
>
NAT
. Click
Apply
to save
your settings or
Cancel
to cancel changes.
Field
Description
NAT
Enables or disables NAT. The default is
enabled.
Gaming DMZ
Device
Click to enable. The default is disabled.
My Gaming
Device
Enter the IP Address for your Gaming Device.
For security purposes, turn off your gaming
device when not in use so that it does not
become the target of intrusion. The default is
disabled.
TCP Session Idle
Time
The TCP Session Idle Time. The time that
elapses before it is assumed the session has
timed out. The default is 8 hours.
UDP Session Idle
Time
User Datagram Protocol. A method used along
with the IP to send data in the form of message
units (datagram) between network devices
over a LAN or WAN. Used primarily for
broadcasting messages over a network. The
default is 8 hours.
Page 68 / 93
3-34
SECTION 3, CONFIGURATION
Field
Description
ICMP Session Idle
Time
The Internet Control Message Protocol is a
protocol used for error, problem, and
informational messages sent between IP hosts
and gateways. The default is 5 minutes.
Networking - Port Trigger
When you run a PC application that accesses the Internet, it typically
initiates communications with a computer on the Internet. In some
applications, especially gaming, the computer on the Internet also
initiates communications with your PC. Because NAT does not
normally allow these incoming connections to occur, the WR850G
supports port triggering.
The WR850G is configured with port triggering for some common
applications. You can also configure additional port triggers if
needed. Configuring port triggers for an application requires a Port
Trigger entry.
To access the screen, click
Networking
>
Port Trigger
. Click
Apply
to save your settings or
Cancel
to cancel changes.
To add a Port Trigger entry:
1
Port Trigger Name
: Enter the name of the application. There is a
limit of 32 characters for the name. Click to enable if you wish it to
become active. Otherwise, you can save the information and
enable it at later date. To enable at a later date, select the entry,
check
enable
, then click
Add
.
Page 69 / 93
SECTION 3, CONFIGURATION
3-35
2
Outgoing Protocol
: From the drop down box, select either TCP or
UDP.
3
Outgoing Port
: Enter the
From
and
To
ranges (0 to 65535) for
your application.
4
Trigger Inbound Protocol
: From the drop down box, select either
TCP or UDP.
5
Incoming Port
: Enter continuous value(s) (0 to 65535), separated
by dashes, for your application. You can also enter multiple
non-continuous values, separated by semicolons.
Idle Time
: Enter the elapsed time before the Port Trigger mapping
closes for all of the listed entries.
To edit or remove
an entry, select it and then click
Edit
or
Remove
to
perform the action.
Networking - Virtual Server
The Virtual Server sets up an automatic inbound forwarding
mechanism for services running on your computer, such as web
servers, email servers, or other specialized applications. When you
use this service, it is suggested that you use Static IP and not DHCP,
because the DHCP server may change the IP address during usage.
You may use DHCP and then reserve the IP address.
The table below lists the current Port Forwarding rules. To access the
screen, click
Networking
>
Virtual Server
. Click
Apply
to save your
settings or
Cancel
to cancel changes.
Page 70 / 93
3-36
SECTION 3, CONFIGURATION
To add a Virtual Server entry:
1
Virtual Server Name
: Enter the name of the server. There is a
limit of 32 characters for the name. Click to enable if you wish it to
become active. Otherwise, you can save the information and
enable it at later date. To enable at a later date, select the entry
and then check enable.
2
Incoming Protocol
: From the drop down box, select from TCP,
UDP, or BOTH.
3
Incoming Port
: Enter the port value (0 to 65535).
4
Forwarding IP
: Enter the IP Address of the server to which you
will forward.
5
Forwarding Port
: Enter the port value (0 to 65535).
6
Schedule Filter:
This is an optional feature.
Click to enable.
Select the time for the forwarding service to be active.
To update or remove
an entry, select it and then click
Edit
or
Remove
to perform the action.
Networking - Firewall
This security device shields your network from the Internet. A firewall,
working closely with a router, examines each network packet to
determine whether to forward it toward its destination. The router
allows further customization of this packet sniffing by allowing you to
modify how and what can or cannot enter the router.
Additionally, the position of the rule within the table determines the
priority of the rule. For example, the first rule in the table applies, then
the second, etc. If the first rule deletes a ‘bad’ packet of information,
then the remaining rules are not invoked.
Multicast Pass-through is typically used for work-related activities,
such as video conferencing access.
To access the screen, click
Networking
>
Firewall
. Click
Apply
to
save your settings or
Cancel
to cancel changes.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top