Page 51 / 63 Scroll up to view Page 46 - 50
300Mbps Wireless-N Broadband Router
User Manual
50
4.6.3.
Address Reservation
Figure 4-41
Address Reservation: reserve IP address for designed physical address host. If you want
to configure a fixed IP address for some host, please input physical address and IP
address, then click add.
4.7.
Forwarding
4.7.1.
Virtual Servers
Figure 4-42
Description: Describe current virtual server item.
Internal Host IP Address: T
he “Internal Host IP Address” indicates IP address of the
internal host using virtual server.
Protocol: The protocol item supplies several protocols. For example, if you have web
server within LAN, you can select the HTTP template then the router will input port
number 80 automatically.
External Port: Input an extranet port number (the users in Internet can see these ports).
Internal Port: Input an intranet port number.
Page 52 / 63
300Mbps Wireless-N Broadband Router
User Manual
51
4.7.2.
Port Triggering
Port trigger module dynamically registers virtual server rules when any IP host generates the
packet from the specified trigger protocol and port. Port trigger module use forward protocol
type and port number and use the IP address of host that generates the trigger packet when it
registers a rule.
Figure 4-43
Predefined Trigger Rules: select one of the Predefined Rules.
Rule Name: describe one Predefined Trigger that you will configure.
Trigger Protocol: you can select TCP/UDP.
Trigger Port: you can select a part of ports.
Forward Protocol: you can select TCP/UDP.
Forward Port: you can select a part of ports.
4.7.3.
DMZ
DMZ opens all the ports of one computer, exposing the computer to the Internet. So it should
only be used for some special-purpose, especial for Internet online games. Using this function
you can select
“DMZ” item and input IP address of DMZ host, then click “Save”. For the
purpose of security, we suggested that using “Virtual serv
ice
r” instead of “DMZ”
.
Page 53 / 63
300Mbps Wireless-N Broadband Router
User Manual
52
Figure 4-44
4.7.4.
UPnP
The UPnP function supports load Application’s port forward
record automatically. Select
“Enable” to enable this function
.
Figure 4-45
4.7.5.
FTP Private Port
Some games, servers, and applications (such as BT, QQ video, Edunkey, Web server) are no
longer effect when behind the NAT router, so this item provides function of port mapping from
LAN to WAN.
Figure 4-46
4.8.
Security
4.8.1.
Security Settings
VPN is commonly used for encapsulate and encrypt data across the public network. For VPN
Page 54 / 63
300Mbps Wireless-N Broadband Router
User Manual
53
tunnel, the router supports IPSEC pass-through, PPTP pass-through and L2TP pass-through.
Figure 4-47
4.8.2.
IP Address Filtering
Figure 4-48
Status: the default is disable.
The rules of “Internet access control” based on source IP,
port number and protocol.
Description: describe IP Firewall list to tell from different IP Firewall lists.
Rule: you can select permit or deny. The default is permit.
Source IP address: input the source IP address that you want to control. The default
format is ***.***.***.***(e.g: 192.168.2.3).
Protocol and Port:
If the rule has already existed in “Protocol Template”. You can select
appropriate item and apply it. Or you can input protocol type and port number manually,
click “add” button, then the item will displayed in the list.
Page 55 / 63
300Mbps Wireless-N Broadband Router
User Manual
54
Follow the following steps to set Internet Access Control:
1. You can select “
enable
” and click “Save” to enable “
IP Firewall
” function. This is only the
first step, you should continued to create appropriate rules for “
IP Firewall
”.
2. Input description information for
current access control rule in the “Description” field. Input
IP address of host you want to restrict.
3.
There are two items supplied, “Permit
through the router for IP address listed, others are
denied” and “
Deny through the router for IP address listed, others are permitted
”, Select the
item you want, and click “Save” button
.
4
. If you want to delete certain item on the list, select appropriate item on the list, click “delete”
to delete it.
4.8.3.
MAC Filtering
Figure 4-49
Status: the default is disable. You can filter wired users by enabling this function; thus
unauthorized users can not access the network.
Description: describe MAC Filter list to tell from different MAC Filter lists
Rule: you can select permit or deny. The default is permit
MAC address: input the MAC address that you want to control. The default format is
**-**-**-**-**-**
e.g.: 00-22-33-da-cc-bb
Follow the following steps to set MAC filter:
1. Enable MAC Filter, then select save.

Rate

3.5 / 5 based on 2 votes.

Popular Netis Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top