Page 86 / 131
                                                    Scroll up to view Page 81 - 85
                                                
                    
User Manual for T2-B-Gawv1.4U10Y.BI 
Teracom Limited 
83 
An ISO Certificed Company 
3.5 
Security 
Click 
Security
to enter security configuration page. On the left page, there are 
three options: 
IP Filtering
, 
Port Forwarding
, and 
Virtual Server
. 
3.5.1 
IP Filtering 
Choose 
Security 
> 
IP Filtering
and the following page appears. In this page, you 
can specify the IP packet filtering rules to prevent unsolicited access from the 
Internet or limit the Internet access from PCs on your network. 
The IP filter feature enables you to create rules that control the forwarding of 
incoming and outgoing data between the LAN and WAN side. When you define an 
 
                 
                                
                    
                        Page 87 / 131
                                            
                    
User Manual for T2-B-Gawv1.4U10Y.BI 
Teracom Limited 
84 
An ISO Certificed Company 
IP filter rule and enable it, you instruct the modem to examine data packets to 
determine whether they meet the criteria. The criteria can include the network or 
Internet protocol, the packet carries, the direction in 
it is traveling. 
Add an IP filter rule 
The procedure for adding an IP filter rule is as follows: 
Step 1 
Enable 
IP Filtering 
and click 
Add
. 
Step 2 
Enter the filter rule name and other parameters. Click 
Apply
. In this 
example, enter 
aa
in the 
Filter Rule Name 
field. This rule named aa can 
forbid any application corresponding to port from 1 to 80. 
 
                 
                                
                    
                        Page 88 / 131
                                            
                    
User Manual for T2-B-Gawv1.4U10Y.BI 
Teracom Limited 
85 
An ISO Certificed Company 
Step 3 
Click 
Apply
and the following page appears. In the 
IP Filter 
Configuration
page, you can view the result of the IP filter configuration. 
3.5.2 
Port Forwarding 
Choose 
Security 
> 
Port Forwarding
and the following page appears. In this page, 
you can create, modify, and delete port forwarding rules. These rules allow 
applications or software to work on your PCs if the Internet connection uses NAT. 
 
                 
                                
                    
                        Page 89 / 131
                                            
                    
User Manual for T2-B-Gawv1.4U10Y.BI 
Teracom Limited 
86 
An ISO Certificed Company 
Click 
Add 
and the following page appears. The IP packages of the Camerades 
application of Audio/Video service that come from the WAN Interface ipwan is 
forwarded to the host with IP address 192.168.1.2. If you select 
User defined
with 
a self-defined name, you can configure the parameters in the page. 
3.5.3 
Virtual Server 
Choose 
Security
> 
Virtual Server
and the following page appears. A virtual server 
is a PC on your local network that can be accessed from the Internet. All interfaces 
for virtual server is listed. 
 
                 
                                
                    
                        Page 90 / 131
                                            
                    
User Manual for T2-B-Gawv1.4U10Y.BI 
Teracom Limited 
87 
An ISO Certificed Company 
Take pppoe_0_35 for example. Click 
to show the 
DMZ Host Configuration 
page. Enter the host address, such as 192.168.1.2. Click 
Apply
. Remote user can 
access the host 192.168.1.2 by the interface pppoe_0_35. IP filter should be 
disabled or add relevant rule. Otherwise, the access request can not reach the 
DMZ host.). 
3.6 
Services 
Click 
Services
to enter service configuration page. On the left page, there are five 
options: 
IGMP Proxy
,
IPv4 Routing
,
IPv6 Routing
,
Quality of Service
,
and
Mac 
Filtering
.
3.6.1 
IGMP Proxy 
Choose 
Services
> 
IGMP Proxy
and the following page appears. Internet Group 
Multicast Protocol (IGMP) is used by routers and hosts that support multicasting. 
All the systems on a physical network identify the multicast grouping of specific 
hosts through IGMP. The multicast routers learn this information and forward the 
multicast datagram to the corresponding interfaces. The IGMP proxy holds up the