Page 81 / 141 Scroll up to view Page 76 - 80
Archer C5
AC1200 Wireless Dual Band Gigabit Router
- 70 -
Figure 4-60 Port Triggering
To add a new rule, follow the steps below.
1.
Click the
Add New…
button, the next screen will pop-up as shown in Figure 4-61.
2.
Select a common application from the
Common Applications
drop-down list, then the
Trigger Port
field and the
Incoming Ports
field will be automatically filled. If the
Common
Applications
do not have the application you need, enter the
Trigger Port
and the
Incoming Ports
manually.
3.
Select the protocol used for Trigger Port from the
Trigger Protocol
drop-down list, either
TCP
,
UDP
, or
All
.
4.
Select the protocol used for Incoming Ports from the
Incoming Protocol
drop-down list,
either
TCP
or
UDP
, or
All.
5.
Select
Enabled
in
Status
field.
6.
Click the
Save
button to save the new rule.
Figure 4-61 Add or Modify a Triggering Entry
Trigger Port
- The port for outgoing traffic. An outgoing connection using this port will trigger
this rule.
Trigger Protocol
- The protocol used for Trigger Ports, either
TCP
,
UDP
, or
All
(all
protocols supported by the router).
Page 82 / 141
Archer C5
AC1200 Wireless Dual Band Gigabit Router
- 71 -
Incoming Port
- The port or port range used by the remote system when it responds to the
outgoing request. A response using one of these ports will be forwarded to the PC which
triggered this rule. You can input at most 5 groups of ports (or port sections). Every group of
ports must be separated with ",", for example, 2000-2038, 2046, 2050-2051, 2085,
3010-3030.
Incoming Protocol
- The protocol used for
Incoming Port
, either
TCP
,
UDP
, or
ALL
(all
protocols supported by the router).
Status
- The status of this entry, Enabled means the Port Triggering entry is enabled.
Modify
- To modify or delete an existing entry.
Common Applications
- Some popular applications already listed in the drop-down list of
Incoming Protocol
.
To modify or delete an existing entry:
1.
Find the desired entry in the table.
2.
Click
Modify
or
Delete
as desired on the
Modify
column.
Click the
Enable All
button to make all entries enabled.
Click the
Disable All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
Once the router is configured, the operation is as follows:
1.
A local host makes an outgoing connection to an external host using a destination port
number defined in the
Trigger Port
field.
2.
The router records this connection, opens the incoming port or ports associated with this
entry in the
Port Triggering
table, and associates them with the local host.
3.
When necessary, the external host will be able to connect to the local host using one of the
ports defined in the
Incoming Ports
field.
Note:
1.
When the trigger connection is released, the corresponding opened ports will be closed.
2.
Each rule can only be used by one host on the LAN at a time. The trigger connection of other
hosts on the LAN will be refused.
3.
Incoming Ports
ranges cannot overlap each other.
Page 83 / 141
Archer C5
AC1200 Wireless Dual Band Gigabit Router
- 72 -
4.12.3
DMZ
Choose menu “
Forwarding
DMZ
”, and then you can view and configure DMZ host in the screen
(shown in Figure 4-62).The DMZ host feature allows one local host to be exposed to the Internet
for a special-purpose service such as Internet gaming or videoconferencing. The router forwards
packets of all services to the DMZ host. Any PC whose port is being forwarded must have its
DHCP client function disabled and should have a new static IP Address assigned to it because its
IP Address may be changed when using the DHCP function.
Figure 4-62 DMZ
To assign a computer or server to be a DMZ server:
1.
Click the
Enable
button.
2.
Enter the IP address of a local PC that is set to be DMZ host in the
DMZ Host IP Address
field.
3.
Click the
Save
button.
4.12.4
UPnP
Choose menu “
Forwarding
UPnP
”, and then you can view the information about
UPnP
in the
screen (shown in Figure 4-63). The
Universal Plug and Play (UPnP)
feature allows the devices,
such as Internet computers, to access the local host resources or devices as needed. UPnP
devices can be automatically discovered by the UPnP service application on the LAN.
Figure 4-63 UPnP Setting
Page 84 / 141
Archer C5
AC1200 Wireless Dual Band Gigabit Router
- 73 -
Current UPnP Status -
UPnP can be enabled or disabled by clicking the
Enable
or
Disable
button. This feature is enabled by default.
Current UPnP Settings List -
This table displays the current UPnP information.
App Description
- The description about the application which initiates the UPnP
request.
External Port
- The port which the router opened for the application.
Protocol
- The type of protocol which is opened.
Internal Port
- The port which the router opened for local host.
IP Address
- The IP address of the local host which initiates the UPnP request.
Status
- Either Enabled or Disabled. "Enabled" means that the port is still active;
otherwise, the port is inactive.
Click the
Enable
button to enable UPnP.
Click the
Disable
button to disable UPnP.
Click the
Refresh
button to update the Current UPnP Settings List.
4.13 Security
Figure 4-64 The Security menu
There are four submenus under the Security menu as shown in Figure 4-64:
Basic Security
,
Advanced Security
,
Local Management
and
Remote Management
.
Click any of them, and you
will be able to configure the corresponding functions.
4.13.1
Basic Security
Choose menu “
Security
Basic Security
”, and then you can configure the basic security in the
screen as shown in Figure 4-65.
Page 85 / 141
Archer C5
AC1200 Wireless Dual Band Gigabit Router
- 74 -
Figure 4-65 Basic Security
Firewall -
A firewall protects your network from the outside world. Here you can enable or
disable the router’s firewall.
SPI Firewall
- SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the
traffic passing through the session conforms to the protocol. SPI Firewall is enabled by
factory default. If you want all the computers on the LAN exposed to the outside world,
you can disable it.
VPN -
VPN Passthrough must be enabled if you want to allow VPN tunnels using VPN
protocols to pass through the router.
PPTP
Passthrough
-
Point-to-Point
Tunneling
Protocol
(PPTP)
allows
the
Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP
tunnels to pass through the router, click
Enable
.
L2TP Passthrough
- Layer Two Tunneling Protocol (L2TP) is the method used to
enable Point-to-Point sessions via the Internet on the Layer Two level. To allow L2TP
tunnels to pass through the router, click
Enable
.
IPSec Passthrough
- Internet Protocol security (IPSec) is a suite of protocols for
ensuring private, secure communications over Internet Protocol (IP) networks, through
the use of cryptographic security services. To allow IPSec tunnels to pass through the
router, click
Enable
.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top