Wireless Cable Modem Gateway CGD24G User Manual
5-4
Customizing Your Network
v1.1, May 2009
•
To deselect a PC from the MAC Filter List, select the PC from the drop-down list, and
then clear its
Enable
check box. Doing so leaves the PC in the MAC Filter List but
ensures that the PC is not blocked.
•
To remove a PC from the MAC Filter List, select the PC from the drop-down list, and then
click
Delete
.
4.
Select the days and times that a selected PC will be blocked:
a.
Day(s) to Block
. Select the days on which the PC that is selected in the MAC Filter List
will be blocked. The default is Everyday.
b.
Time of Day to Block
. Select a start time and an end time to specify a period during
which the PC that is selected in the MAC Filter List will be blocked. The default is All
Day. Be sure that you deselect the
All Day
check box if you want to enter specific times.
The selected period applies to each day that you selected in the previous step.
5.
Click
Add
to save your settings.
6.
Repeat
step 2
through
step 5
for all PCs that you want to block.
Configuring Port Triggering
Port triggering is an advanced feature that can be used to easily enable gaming and other Internet
applications that would otherwise be blocked by the firewall. Using this feature requires that you
know the port numbers that are used by the application.
Port triggering is an advanced feature that can be used to easily enable gaming and other Internet
applications that would otherwise be blocked by the firewall. Using this feature requires that you
know the port numbers that are used by the application.
Once configured, port triggering operation is as follows:
1.
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
2.
The gateway records this connection, opens the incoming port or ports associated with this
entry in the Port Triggering List, and associates them with the PC.
3.
The remote system receives the PCs request, and responds using a different port number.
Note:
For information about port forwarding and port blocking, see
“Firewall Rules—Port Forwarding and Port Blocking” on page 3-5
.