How Do I Configure the Cable Modem Gateway?
Field Name | Description |
Port Forwarding | Use this page to configure port forwarding for local |
| IP addresses. Port forwarding allows you to run a |
| server on the local area network (LAN) by |
| specifying the mapping of TCP/UPD ports to local |
| PCs or to the IP address of other devices. This is a |
| static setting that holds the ports open at all times. |
Port Triggers | Use this page to configure TCP/UPD port triggers. |
| Port triggering is similar to port forwarding, but is a |
| dynamic function. In other words, the ports are not |
| held open, and the ports close if no outgoing data |
| is detected on the selected ports for a period of 10 |
| minutes. |
DMZ Host | Use this page to configure an IP address that is |
(Demilitarized Zone) | visible to the wide area network (WAN). DMZ |
| hosting is commonly referred to as “exposed host,” |
| and allows you to specify the “default” recipient of |
| WAN traffic that Network Address Translation |
| (NAT) is unable to translate to a known local PC. |
| A DMZ is used by a company that wants to host its |
| own Internet services without sacrificing |
| unauthorized access to its private network. DMZ |
| allows one IP address to be unprotected while |
| others remain protected. The DMZ is located |
| between the Internet and an internal network’s line |
| of defense that is a combination of firewalls and |
| bastion hosts. |
| Typically, the DMZ contains devices accessible to |
| Internet traffic, such as Web (HTTP) servers, FTP |
| servers, SMTP |
| system (DNS) servers. |
Firewall
The following table provides a description of the pages available from within the Firewall section of the Setup page.
Field Name | Description |
Web Filters | Use this page to configure Web page filtering and |
| firewall protection. This page allows you to |
| block/allow Internet access based on keywords |
| and/or domain names |
Event Logging | Use this page to access the firewall event log and |
| to enter your |
| mail alerts related to firewall attacks by hackers |
41