Page 36 / 74 Scroll up to view Page 31 - 35
Chapter 2: WEB Configuration
31
6. Port Triggers
Some Internet activities, such as interactive gaming, require that a PC on the WAN side of your gateway
be able to originate connections during the game with your game playing PC on the LAN side. You could
use the Advanced-Forwarding web page to construct a forwarding rule during the game, and then remove
it afterwards (to restore full protection to your LAN PC) to facilitate this. Port triggering is an elegant
mechanism that does this work for you, each time you play the game.
Fig. 22
Port Triggering works as follows. Imagine you want to play a particular game with PCs somewhere on the
Internet. You make one time effort to set up a Port Trigger for that game, by entering into
Trigger Range
the range of destination ports your game will be sending to, and entering into
Target Range
the range of
destination ports the other player (on the WAN side) will be sending to (ports your PC’s game receives
on). Application programs like games publish this information in user manuals. Later, each time you play
the game, the gateway automatically creates the forwarding rule necessary. This rule is valid until 10
minutes after it sees game activity stop. After 10 minutes, the rule becomes inactive until the next
matched outgoing traffic arrives.
For example, suppose you specify Trigger Range from 6660 to 6670 and Target Range from 113 to 113.
An outbound packet arrives at the gateway with your game-playing PC source IP address 192.168.0.10,
destination port 666 over TCP/IP. This destination port is within the Trigger destined for port 113 to your
game-playing PC at 192.168.0.10.
You can specify up to 10 port ranges on which to trigger.
Illustrations contained in this document are for representation only.
Page 37 / 74
Chapter 2: WEB Configuration
32
7
.
DMZ Host
Use this page to designate one PC on your LAN that should be left accessible to all PCs from the WAN
side, for all ports. For example, if you put an HTTP server on this machine, anyone will be able to access
that HTTP server by using your gateway IP address as the destination. A setting of “0” indicates NO DMZ
PC. “Host” is another Internet term for a PC connected to the Internet.
Fig. 23
Illustrations contained in this document are for representation only.
Page 38 / 74
Chapter 2: WEB Configuration
33
8. RIP (Routing Information Protocol) Setup
This feature enables the gateway to be used in small business situations where more than one LAN (local
area network) is installed. The RIP protocol provides the gateway a means to “advertise” available IP
routes to these LANs to your cable operator, so packets can be routed properly in this situation.
Your cable operator will advise you during installation if any setting changes are required here.
Fig. 24
Illustrations contained in this document are for representation only.
Page 39 / 74
Chapter 2: WEB Configuration
34
Firewall
1. Web Content Filtering
These pages allow you to enable, disable, and configure a variety of firewall features associated with web
browsing, which uses the HTTP protocol and transports HTML web pages. On these pages, you designate
the gateway packet types you want to have forwarded or blocked. You can activate settings by checking
them and clicking Apply.
The web-related filtering features you can activate from the Web Content Filter page include Filter Proxy,
Filter Cookies, Filter Java Applets, Filter ActiveX, Filter Popup Windows, and Firewall Protection.
If you want the gateway to exclude your selected filters to certain computers on your LAN, enter their
MAC addresses in the Trusted Computers area of this page.
Fig. 25
Illustrations contained in this document are for representation only.
Page 40 / 74
Chapter 2: WEB Configuration
35
2. TOD Filtering
Use this page to set rules that will block specific LAN side PCs from accessing the Internet, but only at
specific days and times. Specify a PC by its hardware MAC address, and then use the tools to specify
blocking time. Finally, click the Apply button to save your settings.
Fig. 26
Illustrations contained in this document are for representation only.

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top