1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 5354
  8. /
  9. 16
Page 76 / 143 Scroll up to view Page 71 - 75
76
Address
are creating an IPv4 rule this should be an IPv4 address.
If you are
creating an IPv6 rule this should be an IPv6 address.
Start/End Port
Enter the range of port numbers (start and end port) to forward. If
only a single port is desired, enter the same port number in the
Start
and
End
locations.
Protocol
Select the protocol(s) to be forwarded.
Description
A brief description of the rule you have created.
Enabled
Select ON to enable the rule. For security reasons you should leave
the rule disabled if you are not using it.
Note:
You may need to assign static IP addresses to devices on your LAN to insure that
the port forwarding you have set up will always apply to them.
Port Triggers
The Port Triggers page allows you to configure dynamic triggers to specific devices on
the LAN. This allows for special applications that require specific port numbers with
bi-directional traffic to function properly. Applications such as video conferencing, voice,
gaming, and some messaging program features may require these special settings.
Port Triggers are similar to Port Forwarding except that they are not static ports held
open all the time. With the port triggering function, the Cable Modem/Router detects
outgoing data on a specific IP port number and opens corresponding target ports for
incoming data. If no outgoing traffic is detected on the Trigger Range ports for 10
minutes, the Target Range ports will close.
To access the
Port Triggers
page:
1
Click
Advanced
in the menu bar.
2
Then click the
Port Triggers
submenu.
3
To add a new Port Triggers rule, click on the
Create
button, to add a new rule.
Figure 21 shows an example of the menu and Table 13 describes the items you can
select.
Page 77 / 143
77
Figure 21. Example of port Triggers Page
To activate a port trigger
1
Enter the trigger and target ports range for the Internet traffic to forward to.
2
Select the forwarding protocol(s).
3
Enter a name for your port triggering rule.
4
Check the
Enable
box to the bottom of the entry to store settings.
5
Click the
Apply
button to activate the port trigger rules.
Table 15. Port Triggers Menu Option
Option
Description
Trigger Range
(Start / End
Port)
Enter the trigger range (starting and ending ports) of the application
for which you want to enable port triggering. The application will
send data from these ports.
Target Range
(Start / End
Port)
Enter the target range (starting and ending ports) to open for the
same application. The application will receive data on these ports.
Protocol
Select the protocol for this rule.
Description
A brief description of the rule you have created.
Page 78 / 143
78
Enabled
Select ON to enable the rule. For security reasons you should leave
the rule disabled if you are not using it.
DMZ Host
The DMZ (De-militarized Zone) Host page allows you to configure a network device (e.g.
a PC) to be exposed or visible directly to the Internet. This may be used if an application
doesn’t work with port triggers. If you have an application that won’t run properly behind
the NAT firewall, you can configure it for unrestricted two-way Internet access by defining
it as a virtual DMZ host. Adding a client to the DMZ may expose your local network to
various security risks because the client is not protected, so use this option as a last
resort.
To access the
DMZ Host
page:
1
Click
Advanced
in the menu bar.
2
Then click the
DMZ Host
submenu.
Figure 22 shows an example of the menu.
Figure 22. Example of DMZ Host Page
Page 79 / 143
79
To configure DMZ settings:
1
Enter the last byte of the LAN IP address of the PC or other device on your network
that you want to configure as a DMZ host.
2
Click
Apply
.
Note:
If a specific PC is set as a DMZ Host, remember to set this back to “0” when
finished with the needed application, since this PC will be effectively exposed to the
public Internet.
Note:
You may need to assign your DMZ host a static IP address on your LAN to
insure that it will always be at that address.
RIP Setup
The RIP Setup page allows you to configure RIP (Router Information Protocol)
parameters. RIP automatically identifies and uses the best known and quickest route to
any given destination address to help reduce network congestion and delays.
RIP is a protocol that requires negotiation from both sides of the network (e.g. both the
Cable Modem/Router and your service provider’s CMTS (Cable Modem Termination
System)). Your service provider will normally set this up based on their knowledge of
their CMTS settings.
To access the
RIP Setup
page:
1
Click
Advanced
in the menu bar.
2
Then click the
RIP Setup
submenu.
Figure 23 shows an example of the menu and Table 14 describes the items you can
select.
Page 80 / 143
80
Figure 23. Example of RIP Setup Page
Note:
RIP messages will only be sent when the Cable Modem/Router is configured for Static IP
Addressing (see the
Basic – Setup
page).
It is unlikely that your cable Internet service supports this mode. If they do, and you want
to enable RIP, you will need to ask for the CMTS’s key name and number. You may need
additional information.
To enable the Cable Modem/Router to perform RIP, do the following (this example uses
BRCMV2 as the RIP Authentication Key and 1 as the Key ID):
To turn on RIP, check the Enable box.
To turn on RIP MD5 Authentication, and check the
Enable
box.
To specify a RIP MD5 Authentication Key String, type
BRCMV2
for this example.
key name = a string value to match CMTS key name value
To specify a RIP MD5 Auth Key ID, type
1
.
key number = a number to match the CMTS key number value
To change the RIP announcement interval, enter a number in seconds.
reporting interval by default = 30 seconds
To specify a RIP unicast destination IP address, enter the IP address and subnet
mask.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top