Linksys WRV200 manual Firewall Port Triggering, Firewall DMZ

Page 24

Chapter 5

Configuring the Wireless-G Router

The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.)

When users send this type of request to your network via the Internet, the Router will forward those requests to the appropriate PC. Any PC whose port is being forwarded must have its DHCP client function disabled and must have a new static IP address assigned to it because its IP address may change when using the DHCP function.

Application Name  Enter the name you wish to give the application. Each name can be up to 12 characters.

Port Range Start/End  This is the port range. Enter the number that starts the port range under Start and the number that ends the range under End.

Protocol  Enter the protocol used for this application, either TCP or UDP, or Both.

IP Address  For each application, enter the IP Address of the PC running the specific application.

Enabled  Click the Enabled checkbox to enable port forwarding for the relevant application.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Firewall > Port Triggering

Firewall > Port Triggering

Port Triggering is used for special Internet applications whose outgoing ports differ from the incoming ports. For this feature, the Router will watch outgoing data for specific port numbers. The Router will remember the IP address of the computer that sends a transmission requesting data, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.

Application  In this field, enter the name you wish to give the application. Each name can be up to 12 characters.

Triggered Range Start Port/End Port  Enter the number that starts the triggered port range under Start Port and the number that ends the range under End Port.

Forwarded Range Start Port/End Port  Enter the number that starts the forwarded port range under Start Port and the number that ends the range under End Port.

Protocol  Enter the protocol used for this application, either TCP or UDP, or Both.

Enabled  Click the Enabled checkbox to enable port triggering for the relevant application.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Firewall > DMZ

The DMZ screen allows one local PC to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing through Software DMZ. Whereas Port Range Forwarding can only forward a maximum of 10 ranges of ports, DMZ hosting forwards all the ports for one PC at the same time.

Firewall > DMZ

Software DMZ  This feature allows one local PC to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing. To use this feature, select Enabled. To disable the Software DMZ feature, select Disabled.

DMZ Host IP Address  To expose one PC, enter the computer’s IP address.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Wireless-G VPN Router with RangeBooster

19

Image 24
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless Security ChecklistAppendix E Gateway-to-Gateway VPN Tunnel Appendix I Regulatory InformationAppendix J Contact Information Chapter IntroductionChapter Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Network LayoutWhy do I need a VPN? What is a VPN?Chapter Planning Your Virtual Private Network VPN Computer using the Linksys VPN client software to VPN Router VPN Router to VPN RouterChapter Product Overview Product OverviewFront Panel Back PanelChapter Configuring the Wireless-G VPN Router OverviewHow to Access the Web-based Utility SetupSetup Basic Settings Internet SetupPptp Optional Settings Required by some ISPs LAN SetupSetup Vlan Setup DdnsTime Settings Setup MAC Address Clone DdnsSetup Advanced Routing Dynamic RoutingStatic Routing Wireless Wireless Basic Wireless SettingsWireless Wireless Security Wireless Network ModeWPA2 Personal WPA EnterpriseWPA2 Enterprise WPA2 Personal Mixed WPA2 Enterprise MixedWireless Wireless Network Access Wireless Network AccessWireless Advanced Wireless Settings Wireless WDSAdvanced Wireless Settings Firewall Firewall GeneralFirewall Port Forwarding Internet BlockFirewall Port Triggering Firewall DMZFirewall Access Restriction VPN VPN Client AccessFirewall URL Filtering VPN VPN Passthrough VPN Client List TableCertificate Management VPN IPSec VPN Local Secure GroupRemote Secure Group Remote Secure Gateway Key ManagementTunnel Options VPN VPN Summary QoS QoS Application-Based QoSQoS Port-Based QoS Priority QueueAdministration Administration ManagementAdmin Password Local Router AccessAdministration Log Backup and RestoreUPnP Administration Diagnostics Administration Factory DefaultAdministration Firmware Upgrade Ping TestAdministration Reboot StatusStatus Router InformationStatus Wireless Status Local NetworkStatus System Performance Local NetworkStatus VPN Clients System PerformanceVPN Summary Appendix a Troubleshooting TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Click Save Settings Go to the Firewall DMZ tabGo to the Setup Basic Setup tab Click the Firewall Port Triggering tabFrequently Asked Questions WRV200 does not support NetBIOS Broadcast overIs the Router cross-platform compatible? Appendix B Wireless Security Checklist Wireless Security ChecklistAppendix B General Network Security GuidelinesInstalling from the CD-ROM Appendix CAppendix C Overview Before You BeginUsing the Linksys QuickVPN Software Version Number of the QuickVPN ClientSelect VPN, then VPN Client Access Distributing Certificates to QuickVPN Users\Program Files\Linksys\QuickVPN Client\ Appendix D IntroductionEnvironment Create an IPSec PolicyFilter List 2 router win Configure Individual Tunnel Rules Tunnel 1 win-RouterTunnel 2 Router-win Rules Tab Assign New IPSec Policy Create a Tunnel Through the Web-Based UtilityYour tunnel should now be established Configuration of the WRV200 Appendix EAppendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNConfiguration of the RV082 Configuration of PC 1 and PCClick the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Appendix F GlossaryGlossary Http HyperText Transport ProtocolGlossary Smtp Simple Mail Transfer Protocol The standard eAppendix F Appendix G Specifications SpecificationsAppendix G Specifications Warranty Information Obtaining Warranty ServiceAppendix H Exclusions and LimitationsWarranty Information Technical SupportAppendix Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Appendix J Contact Information
Related manuals
Manual 2 pages 11.27 Kb