Page 156 / 258 Scroll up to view Page 151 - 155
TL-MR3020
Portable 3G/4G Wireless N Router
To modify or delete an existing entry:
1.
Find the desired entry in the table.
2.
Click
Modify
or
Delete
as desired on the
Modify
column.
Click the
Enable/ Disable All
button to make all entries enabled/ disabled.
Click the
Delete All
button to delete all entries.
Click the
Next
button to go to the next page and click the
Previous
button to return to the
previous page.
Note:
If you set the service port of the virtual server as 80, you must set the Web management port on
Security –> Remote Management
page to be any other value except 80 such as 8080.
Otherwise there will be a conflict to disable the virtual server.
5.8.2
Port Triggering
Choose menu “
Forwarding
Port Triggering
”, you can view and add port triggering in the next
screen (shown in Figure 5-34). Some applications require multiple connections, like Internet
games, video conferencing, Internet telephoning and so on. Port Triggering is used for some of
these applications that cannot work with a pure NAT Router.
Figure 5-34
Port Triggering
To add a new rule, follow the steps below.
1.
Click the
Add New…
button, the next screen will pop-up as shown in Figure 5-35.
2.
Select a common application from the
Common Applications
drop-down list, then the
Trigger Port
field and the
Incoming Ports
field will be automatically filled. If the
Common
Applications
do not have the application you need, enter the
Trigger Port
and the
Incoming Ports
manually.
3.
Select the protocol used for Trigger Port from the
Trigger Protocol
drop-down list, either
TCP
,
UDP
, or
All
.
4.
Select the protocol used for Incoming Ports from the
Incoming Protocol
drop-down list,
either
TCP
or
UDP
, or
All.
-145-
Page 157 / 258
TL-MR3020
Portable 3G/4G Wireless N Router
5.
Select
Enable
in
Status
field.
6.
Click the
Save
button to save the new rule.
Figure 5-35
Add or Modify a Triggering Entry
Trigger Port
- The port for outgoing traffic. An outgoing connection using this port will
trigger this rule.
Trigger Protocol
- The protocol used for Trigger Ports, either
TCP
,
UDP
, or
All
(all
protocols supported by the Router).
Incoming Port
- The port or port range used by the remote system when it responds to
the outgoing request. A response using one of these ports will be forwarded to the PC
which triggered this rule. You can input at most 5 groups of ports (or port sections). Every
group of ports must be separated with ",", for example, 2000-2038, 2046, 2050-2051,
2085, 3010-3030.
Incoming Protocol
- The protocol used for
Incoming Port
, either
TCP
,
UDP
, or
ALL
(all
protocols supported by the Router).
Status
- The status of this entry, Enabled means the Port Triggering entry is enabled.
Modify
- To modify or delete an existing entry.
Common Applications
- Some popular applications already listed in the drop-down list of
Incoming Protocol
.
To modify or delete an existing entry:
1.
Find the desired entry in the table.
2.
Click
Modify
or
Delete
as desired on the
Modify
column.
Click the
Enable All
button to make all entries enabled.
Click the
Disable All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
-146-
Page 158 / 258
TL-MR3020
Portable 3G/4G Wireless N Router
Once the Router is configured, the operation is as follows:
1.
A local host makes an outgoing connection to an external host using a destination port
number defined in the
Trigger Port
field.
2.
The Router records this connection, opens the incoming port or ports associated with this
entry in the
Port Triggering
table, and associates them with the local host.
3.
When necessary, the external host will be able to connect to the local host using one of
the ports defined in the
Incoming Ports
field.
Note:
1)
When the trigger connection is released, the corresponding opened ports will be closed.
2)
Each rule can only be used by one host on the LAN at a time. The trigger connection of
other hosts on the LAN will be refused.
3)
Incoming Ports
ranges cannot overlap each other.
5.8.3
DMZ
Choose menu “
Forwarding
DMZ
”, and then you can view and configure DMZ host in the
screen (shown in Figure 5-36).The DMZ host feature allows one local host to be exposed to the
Internet for a special-purpose service such as Internet gaming or videoconferencing. The
Router forwards packets of all services to the DMZ host. Any PC whose port is being forwarded
must have its DHCP client function disabled and should have a new static IP Address assigned
to it because its IP Address may be changed when using the DHCP function.
Figure 5-36
DMZ
To assign a computer or server to be a DMZ server:
1. Click the
Enable
button.
2.
Enter the IP address of a local PC that is set to be DMZ host in the
DMZ Host IP Address
field.
3. Click the
Save
button.
-147-
Page 159 / 258
TL-MR3020
Portable 3G/4G Wireless N Router
5.8.4
UPnP
Choose menu “
Forwarding
UPnP
”, and then you can view the information about
UPnP
in the
screen (shown in Figure 5-37). The
Universal Plug and Play (UPnP)
feature allows the
devices, such as Internet computers, to access the local host resources or devices as needed.
UPnP devices can be automatically discovered by the UPnP service application on the LAN.
Figure 5-37
UPnP Setting
Current UPnP Status -
UPnP can be enabled or disabled by clicking the
Enable
or
Disable
button. This feature is enabled by default.
Current UPnP Settings List -
This table displays the current UPnP information.
App Description
- The description about the application which initiates the UPnP
request.
External Port
- The port which the Router opened for the application.
Protocol
- The type of protocol which is opened.
Internal Port
- The port which the Router opened for local host.
IP Address
- The IP address of the local host which initiates the UPnP request.
Status
- Either Enabled or Disabled. "Enabled" means that the port is still active;
otherwise, the port is inactive.
Click the
Enable
button to enable UPnP.
Click the
Disable
button to disable UPnP.
Click the
Refresh
button to update the Current UPnP Settings List.
-148-
Page 160 / 258
TL-MR3020
Portable 3G/4G Wireless N Router
5.9 Security
Figure 5-38
The Security menu
There are four submenus under the Security menu as shown in Figure 5-38:
Basic Security
,
Advanced Security
,
Local Management
and
Remote Management.
Click any of them, and
you will be able to configure the corresponding function.
5.9.1
Basic Security
Choose menu “
Security
Basic Security
”, and then you can configure the basic security in
the screen as shown in Figure 5-39.
Figure 5-39
Basic Security
Firewall -
A firewall protects your network from the outside world. Here you can enable or
disable the Router’s firewall.
SPI Firewall
- SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the
traffic passing through the session conforms to the protocol. SPI Firewall is enabled
by factory default. If you want all the computers on the LAN exposed to the outside
world, you can disable it.
-149-

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top