Page 41 / 70 Scroll up to view Page 36 - 40
TL-WR340G/TL-WR340GD
54M Wireless Router User Guide
35
2.
Modify the information.
3.
Click the
Save
button.
Click the
Enable All
button to make all entries enabled
Click the
Disabled All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
Click the
Next
button to go to the next page and Click the
Previous
button to return the previous
page.
)
Note:
If you set the virtual server of service port as 80, you must set the Web management port on
Security –> Remote Management page to be any value except 80 such as 8080. Or else there will
be a conflict to disable the virtual server.
3.7.2
Port Triggering
Some applications require multiple connections, like Internet games, video conferencing, Internet
calling and so on. These applications cannot work with a pure NAT router. Port Triggering is
used for some of these applications that can work with an NAT router. You can set up Port
Triggering on this page shown in Figure 3-30:
Figure 3-30 Port Triggering
Once configured, operation is as follows:
1.
A local host makes an outgoing connection using a destination port number defined in the
Trigger Port field.
2.
The router records this connection, opens the incoming port or ports associated with this
entry in the Port Triggering table, and associates them with the local host.
3.
When necessary the external host will be able to connect to the local host using one of the
ports defined in the
Incoming Ports
field.
¾
Trigger Port -
The port for outgoing traffic. An outgoing connection using this port will
"Trigger" this rule.
¾
Trigger Protocol -
The protocol used for Trigger Ports, either
TCP
,
UDP
, or
All
(all
protocols supported by the router).
¾
Incoming Ports Range -
The port or port range used by the remote system when it
responds to the outgoing request. A response using one of these ports will be forwarded to
Page 42 / 70
TL-WR340G/TL-WR340GD
54M Wireless Router User Guide
36
the PC that triggered this rule. You can input at most 5 groups of ports (or port section).
Every group of ports must be set apart with ",". For example, 2000-2038, 2050-2051, 2085,
3010-3030.
¾
Incoming Protocol -
The protocol used for Incoming Ports Range, either TCP or UDP, or
ALL (all protocols supported by the router).
¾
Status -
The status of this entry either
Enabled
or
Disabled
.
To add a new rule, enter the following data on the
Port Triggering
screen.
1.
Click the
Add New button
. (pop-up Figure 3-31)
2.
Enter a port number used by the application when it generates an outgoing request.
3.
Select the protocol used for
Trigger Port
from the pull-down list, either
TCP
,
UDP
, or
All.
4.
Enter the range of port numbers used by the remote system when it responds to the PC's
request.
5.
Select the protocol used for
Incoming Ports Range
from the pull-down list, either
TCP
or
UDP
, or
All.
6.
Select the
Enable
checkbox to enable.
7.
Click the
Save
button to save the new rule.
Figure 3-31 Add or Modify a Triggering Entry
There are many popular applications in the
Popular Application
list. You can select it, and the
application will fill in the
Trigger Port
,
incoming Ports Range
boxes and select the
Enable
checkbox. It has the same effect as adding a new rule.
To modify or delete an existing entry:
1.
Click the
Modify
in the entry you want to modify. If you want to delete the entry, click the
Delete
.
2.
Modify the information.
3.
Click the
Save
button.
Click the
Enable All
button to make all entries enabled
Click the
Disabled All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
Page 43 / 70
TL-WR340G/TL-WR340GD
54M Wireless Router User Guide
37
)
Note:
When the trigger connection is released, the according opening ports will be closed.
Each rule allowed to be used only by one host on LAN synchronously. The trigger connection of
other hosts on LAN will be refused.
Incoming Port Range cannot overlap each other.
3.7.3
DMZ
The DMZ host feature allows one local host to be exposed to the Internet for a special-purpose
service such as Internet gaming or videoconferencing. DMZ host forwards all the ports at the
same time. Any PC whose port is being forwarded must have its DHCP client function disabled
and should have a new static IP Address assigned to it because its IP Address may change when
using the DHCP function. You can set up DMZ host on this page shown in figure 5-29:
Figure 3-32 DMZ
To assign a computer or server to be a DMZ server:
1.
Click the
Enable
radio button
2.
Enter the local host IP Address in the
DMZ Host IP Address
field
)
Note:
After you set the DMZ host, the firewall related to the host will not work.
3.7.4
UPnP
The Universal Plug and Play (UPnP) feature allows the devices, such as Internet computers, to
access the local host resources or devices as needed. UPnP devices can be automatically
discovered by the UPnP service application on the LAN. You can configure UPnP on this page
that shown in Figure 3-33:
Figure 3-33 UPnP Settings
¾
Current UPnP Status -
UPnP can be enabled or disabled by clicking the
Enable
or
Disable
Page 44 / 70
TL-WR340G/TL-WR340GD
54M Wireless Router User Guide
38
button. As allowing this may present a risk to security, this feature is disabled by default.
¾
Current UPnP Settings List -
This table displays the current UPnP information.
App Description
– The description provided by the application in the UPnP request
External Port
-
External port, which the router opened for the application.
Protocol
Shows which type of protocol is opened.
Internal Port
-
Internal port, which the router opened for local host.
IP Address
-
The UPnP device that is currently accessing the router.
Status -
Either Enabled or Disabled, “Enabled” means that port is still active. Otherwise,
the port is inactive.
Click
Refresh
to update the Current UPnP Settings List.
3.8
Security
Figure 3-34 The Security menu
There are six submenus under the Security menu (shown in Figure 3-34):
Firewall
,
IP Address
Filtering, Domain Filtering, MAC Filtering, Remote Management
and
Advanced Security.
Click any of them, and you will be able to configure the corresponding function. The detailed
explanations for each submenu are provided below.
3.8.1
Firewall
Using the Firewall page (shown in Figure 3-35), you can turn the general firewall switch on or off.
The default setting for the switch is off. If the general firewall switch is off, even if IP Address
Filtering, DNS Filtering and MAC Filtering are enabled, their settings are ineffective.
Page 45 / 70
TL-WR340G/TL-WR340GD
54M Wireless Router User Guide
39
Figure 3-35 Firewall Settings
¾
Enable Firewall -
the general firewall switch is on or off.
¾
Enable IP Address Filtering -
set IP Address Filtering is enabled or disabled. There are two
default filtering rules of IP Address Filtering, either Allow or Deny passing through the router.
¾
Enable Domain Filtering -
set Domain Filtering is enabled or disabled.
¾
Enable MAC Filtering -
set MAC Address Filtering is enabled or disabled. You can select the
default filtering rules of MAC Address Filtering, either Allow or Deny accessing the router.
3.8.2
IP Address Filtering
The IP address Filtering feature allows you to control Internet Access by specific users on your
LAN based on their IP addresses. The IP address filtering is set on this page, Figure 3-36:
Figure 3-36 IP address Filtering
To disable the IP Address Filtering feature, keep the default setting,
Disabled
. To set up an IP

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top