User's Manual
Table Of Contents
on a profile to prevent users from accessing the application on the WAN.
Name: Type a descriptive name for the application.
Trigger: Defines the outgoing communication that determines whether the user has
legitimate access to the application.
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used to access
the application.
● Port Range: Type the port range that can be used to access the application in the
text boxes.
Incoming: Defines which incoming communications users are permitted to connect
with.
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used by the
incoming communication.
● Port: Type the port number that can be used for the incoming communication.
Add: Click to add the special application profile to the table at the bottom of the
screen.
Update: Click to update information for the special application if you have selected a
list item and have made changes.
Delete: Select a list item and click Delete to remove the item from the list.
New: Click New to erase all fields and enter new information.
3.5.4 DMZ
This screen enables you to create a DMZ for those computers that cannot access
Internet applications properly through the router and associated security settings.
Note: Any clients added to the DMZ exposes the clients to security risks such as
viruses and unauthorized access.
Enable: Click to enable or disable the DMZ.
DMZ Host IP: Type a host IP address for the DMZ. The computer with this IP
address acts as a DMZ host with unlimited Internet access.
Apply: Click to save the settings.
3.5.5 Firewall Rule
This screen enables you to set up the firewall. The router provides basic firewall
functions, by filtering all the packets that enter the router using a set of rules. The
rules are in an order sequence list--the lower the rule number, the higher the priority
32