Page 71 / 128 Scroll up to view Page 66 - 70
TL-WR2543ND
450Mbps Dual-Band Wireless N Gigabit Router
- 64 -
Click the
Next
button to go to the next page and click the
Previous
button to return to the
previous page.
)
Note:
If you set the service port of the virtual server as 80, you must set the Web management port on
System Tools –> Remote Management
page to be any other value except 80 such as 8080.
Otherwise there will be a conflict to disable the virtual server.
4.9.2
Port Triggering
Choose menu “
Forwarding
Port Triggering
”, you can view and add port triggering in the next
screen (shown in Figure 4-49). Some applications require multiple connections, like Internet
games, video conferencing, Internet telephoning and so on. Port Triggering is used for some of
these applications that cannot work with a pure NAT Router.
Figure 4-49
Port Triggering
To add a new rule, follow the steps below.
1.
Click the
Add New…
button, the next screen will pop-up as shown in Figure 4-50.
2.
Select a common application from the
Common Applications
drop-down list, then the
Trigger Port
field and the
Incoming Ports
field will be automatically filled. If the
Common
Applications
do not have the application you need, enter the
Trigger Port
and the
Incoming Ports
manually.
3.
Select the protocol used for Trigger Port from the
Trigger Protocol
drop-down list, either
TCP
,
UDP
, or
All
.
4.
Select the protocol used for Incoming Ports from the
Incoming Protocol
drop-down list,
either
TCP
or
UDP
, or
All.
5.
Select
Enable
in
Status
field.
6.
Click the
Save
button to save the new rule.
Page 72 / 128
TL-WR2543ND
450Mbps Dual-Band Wireless N Gigabit Router
- 65 -
Figure 4-50
Add or Modify a Triggering Entry
¾
Trigger Port
- The port for outgoing traffic. An outgoing connection using this port will trigger
this rule.
¾
Trigger Protocol
- The protocol used for Trigger Ports, either
TCP
,
UDP
, or
All
(all
protocols supported by the Router).
¾
Incoming Port
- The port or port range used by the remote system when it responds to the
outgoing request. A response using one of these ports will be forwarded to the PC which
triggered this rule. You can input at most 5 groups of ports (or port sections). Every group of
ports must be separated with ",", for example, 2000-2038, 2046, 2050-2051, 2085,
3010-3030.
¾
Incoming Protocol
- The protocol used for
Incoming Port
, either
TCP
,
UDP
, or
ALL
(all
protocols supported by the Router).
¾
Status
- The status of this entry, Enabled means the Port Triggering entry is enabled.
¾
Modify
- To modify or delete an existing entry.
¾
Common Applications
- Some popular applications already listed in the drop-down list of
Incoming Protocol
.
To modify or delete an existing entry:
1.
Find the desired entry in the table.
2.
Click
Modify
or
Delete
as desired on the
Modify
column.
Click the
Enable All
button to make all entries enabled.
Click the
Disabled All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
Once the Router is configured, the operation is as follows:
Page 73 / 128
TL-WR2543ND
450Mbps Dual-Band Wireless N Gigabit Router
- 66 -
1.
A local host makes an outgoing connection to an external host using a destination port
number defined in the
Trigger Port
field.
2.
The Router records this connection, opens the incoming port or ports associated with this
entry in the
Port Triggering
table, and associates them with the local host.
3.
When necessary, the external host will be able to connect to the local host using one of the
ports defined in the
Incoming Ports
field.
)
Note:
1.
When the trigger connection is released, the corresponding opened ports will be closed.
2.
Each rule can only be used by one host on the LAN at a time. The trigger connection of other
hosts on the LAN will be refused.
3.
Incoming Ports
ranges cannot overlap each other.
4.9.3
DMZ
Choose menu “
Forwarding
DMZ
”, and then you can view and configure DMZ host in the screen
(shown in Figure 4-51).The DMZ host feature allows one local host to be exposed to the Internet
for a special-purpose service such as Internet gaming or videoconferencing. The Router forwards
packets of all services to the DMZ host. Any PC whose port is being forwarded must have its
DHCP client function disabled and should have a new static IP Address assigned to it because its
IP Address may be changed when using the DHCP function.
Figure 4-51
DMZ
To assign a computer or server to be a DMZ server:
1. Click the
Enable
button.
2.
Enter the IP address of a local PC that is set to be DMZ host in the
DMZ Host IP Address
field.
3. Click the
Save
button.
4.9.4
UPnP
Choose menu “
Forwarding
UPnP
”, and then you can view the information about
UPnP
in the
screen (shown in Figure 4-52). The
Universal Plug and Play (UPnP)
feature allows the devices,
such as Internet computers, to access the local host resources or devices as needed. UPnP
Page 74 / 128
TL-WR2543ND
450Mbps Dual-Band Wireless N Gigabit Router
- 67 -
devices can be automatically discovered by the UPnP service application on the LAN.
Figure 4-52
UPnP Setting
¾
Current UPnP Status -
UPnP can be enabled or disabled by clicking the
Enable
or
Disable
button. This feature is enabled by default.
¾
Current UPnP Settings List -
This table displays the current UPnP information.
App Description
- The description about the application which initiates the UPnP
request.
External Port
- The port which the Router opened for the application.
Protocol
- The type of protocol which is opened.
Internal Port
- The port which the Router opened for local host.
IP Address
- The IP address of the local host which initiates the UPnP request.
Status
- Either Enabled or Disabled. "Enabled" means that the port is still active;
otherwise, the port is inactive.
Click the
Enable
button to enable UPnP.
Click the
Disable
button to disable UPnP.
Click the
Refresh
button to update the Current UPnP Settings List.
Page 75 / 128
TL-WR2543ND
450Mbps Dual-Band Wireless N Gigabit Router
- 68 -
4.10 Security
Figure 4-53
The Security menu
There are four submenus under the Security menu as shown in Figure 4-53:
Basic Security
,
Advanced Security
,
Local Management
and
Remote Management.
Click any of them, and you
will be able to configure the corresponding function.
4.10.1 Basic Security
Choose menu “
Security
Basic Security
”, and then you can configure the basic security in the
screen as shown in Figure 4-54.
Figure 4-54
Basic Security
¾
Firewall -
A firewall protects your network from the outside world. Here you can enable or
disable the Router’s firewall.
SPI Firewall
- SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the
traffic passing through the session conforms to the protocol. SPI Firewall is enabled by
factory default. If you want all the computers on the LAN exposed to the outside world,
you can disable it.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top