Page 36 / 69
                                                    Scroll up to view Page 31 - 35
                                                
                    
36
NetComm NF2 User Guide
www.netcommlimited.com 
YML27 
Forwarding Rules 
The forwarding rules section deals with NAT traversal. Using the Virtual Server settings port forwarding can be configured. Special 
AP settings can be used to configure port triggering. In the Miscellaneous section a DMZ host can be configured and UPnP can be 
enabled or disabled. 
Virtual Server 
The Virtual Server page allows you to direct incoming traffic from the Internet side (identified by Protocol and External port) to the 
internal server with a private IP address on the LAN side. The Internal port is required only if the external port needs to be converted 
to a different port number used by the server on the LAN side. A maximum of 20 entries can be configured. In addition a series of 
pre-configured commonly used ports can be selected for easy setup. 
Figure 27: Advanced - Forwarding Rules - Virtual Server 
OPTION 
DEFINITION 
Service Ports 
Enter the port number or port range to be used with the Server IP address. For a port range entry use the 
format shown in the following example (81-90). 
Server IP 
Enter the local IP address of the device you wish to port forward to. 
Enable 
Select this option to enable the port forwarding rule. 
Use Rule 
Select when the port forwarding rule should be used. The default option is Always. 
Table 20: Advanced - Forwarding Rules - Virtual Server Settings 
 
                 
                                
                    
                        Page 37 / 69
                                            
                    
www.netcommlimited.com
NF2 
–
Dual Band Wi-Fi Gigabit Hub User Guide 
37 
YML38
Special AP 
The Special AP page allows the router to be configured for port triggering. Port triggering allows a client device connected to the 
router to dynamically and automatically forward a specific port back to itself. Port triggering opens an incoming port when your 
computer is using a specified outgoing port for specific traffic. A selection of common port triggering settings come preconfigured 
on the NF2 for easy setup. 
Figure 28: Advanced - Forwarding Rules - Port Triggering 
OPTION 
DEFINITION 
Trigger 
Enter the outgoing trigger port be opened by a device connected to the router. 
Incoming Ports 
Enter the incoming port number or port ranges. For a port range use a dash (-) between the lower and upper 
range numbers; e.g. 5000-6000. Use a comma between multiple numbers. 
Enable 
Select this option to enable or disable the port triggering rule. 
Table 21: Advanced - Forwarding Rules - Port Triggering Settings 
Miscellaneous 
The miscellaneous page gives the user the option of enabling or disabling UPnP protocol or the option to assign a device connected 
to the router as a DMZ host. A DMZ host is a host on the internal network that has all ports exposed to a WAN connection, except 
those ports otherwise forwarded. 
Figure 29: Advanced - Forwarding Rules - Miscellaneous 
 
                 
                                
                    
                        Page 38 / 69
                                            
                    
38
NetComm NF2 User Guide
www.netcommlimited.com 
YML27 
Security Settings 
The security settings menu has such configuration options for the NetComm NF2 as Packet Filtering, MAC Filtering, Domain 
Filtering, URL Blocking, MAC Control and Remote Administration settings. 
Status 
The Security Settings Status page provides an overview of the current IP filter, MAC filter and domain filter rules in place on the NF2. 
Figure 30: Advanced - Security Settings 
–
Status 
Packet Filtering 
The inbound and outbound packet filtering function gives the network administrator the option of denying or allowing data packets 
to be transmitted through to the WAN interface when any of the specified rules are met. Conversely any other data packets not 
matching these rules will be denied or allowed access through the network as specified by the network administrator. 
Figure 31: Advanced - Security Settings - Packet Filtering 
 
                 
                                
                    
                        Page 39 / 69
                                            
                    
www.netcommlimited.com
NF2 
–
Dual Band Wi-Fi Gigabit Hub User Guide 
39 
YML38
OPTION 
DEFINITION 
Source IP 
Enter the local source IP address where the packet originates from for an outgoing packet filter rule or is being 
sent to for an incoming packet filter rule. 
Destination IP: Ports 
Enter the WAN IP address and port number or range where the packet is directed to or from.. 
Enable 
Select this option to make the packet filter rule active. 
Use Rule# 
Select when the rule is to be used. The default value is Always. 
Table 22: Advanced - Security Settings - Packet Filtering Settings 
MAC Control 
The MAC filter function can be used to restrict access to the NF2 for both wired and wireless clients. Using Connection Control 
wired and wireless clients can connect to the router and either allow or deny any unspecified MAC addresses connection access. 
Using association control wireless clients can associate to the wireless LAN. All other unspecified wireless clients can be allowed or 
denied association rights. 
Figure 32: Advanced - Security Settings - MAC Filtering 
 
                 
                                
                    
                        Page 40 / 69
                                            
                    
40
NetComm NF2 User Guide
www.netcommlimited.com 
YML27 
Domain Filter 
Domain Filtering can be used to monitor and or deny access to specified domain names. 
Figure 33: Advanced - Security Settings - Domain Filter 
OPTION 
DEFINITION 
Domain Filter 
Select this option to enable Domain Filtering 
Log DNS Query 
Select this option to log DNS Queries for all specified domain names. 
Privilege IP Addresses Range 
Enter the range of IP addresses that will not be filtered. 
Domain Suffix 
Enter the domain name you wish to deny or have log. 
Drop 
Select drop if you wish to deny access to the specified domain name 
Log 
Select Log if you wish to log any attempts to access the specified domain name. 
Enable 
Select this option to enable the domain filter rule. 
Table 23: Advanced - Security Settings - Domain Filtering Settings: