Linksys WRT120N manual Applications & Gaming Port Range Triggering, Applications and Gaming DMZ

Page 24

Chapter 3

Advanced Configuration

Start~End Port  Enter the number or range of port(s) used by the server or Internet applications. Check with the Internet application documentation for more information.

Protocol  Select the protocol(s) used for this application, TCP, UDP, or Both.

To IP Address  For each application, enter the IP address of the computer that should receive the requests. If you assigned a static IP address to the computer, then you can look up its IP address; click DHCP Reservation on the Basic Setup screen (refer to DHCP Reservation, page 7).

Enabled  Select Enabled to enable port forwarding for the applications you have defined.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Applications & Gaming > Port Range Triggering

The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.

Applications and Gaming > Port Range Triggering

Port Range Triggering

Application Name  Enter the application name of the trigger.

Triggered Range  For each application, enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.

ForwardedRange  For each application, enter the starting and ending port numbers of the forwarded port number range. Check with the Internet application documentation for the port number(s) needed.

Enabled  Select Enabled to enable port triggering for the applications you have defined.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Applications and Gaming > DMZ

The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one computer. The Port Range Forwarding feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.

Applications and Gaming > DMZ

DMZ

Any computer whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function.

Enabled/Disabled  To disable DMZ hosting, select Disabled. To expose one computer, select Enabled. Then configure the following settings:

Source IP Address  If you want any IP address to be the source, select Any IP Address. If you want to specify an IP address or range of IP addresses as the designated source, select and complete the IP address range fields.

Destination  If you want to specify the DMZ host by IP address, select IP Address and enter the IP address in the field provided. If you want to specify the DMZ host

Wireless-N Home Router

20

Image 24
Contents Wireless-N Home Router Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Warranty Information Appendix D Regulatory InformationAppendix E Software End User License Agreement Horizontal Placement Front PanelBack Panel Wall-Mounting Placement Suggested Mounting HardwareGeneral Network Security Guidelines Additional Security TipsAccess the Browser-Based Utility Setup Basic SetupInternet Setup LanguageAutomatic Configuration Dhcp Static IPPPPoE PptpOptional Settings L2TPTelstra Cable Network Setup Dhcp Server SettingRouter IP Dhcp ReservationSetup Ddns Time SettingsDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingWireless Basic Wireless Settings Basic Wireless Settings ManualRouting Table Wi-Fi Protected Setup Method #1Method #2 Wireless Wireless Security Wireless SecuritySecurity Mode Method #3WPA Enterprise WPA2 EnterpriseRadius Wireless Wireless MAC Filter Wireless MAC FilterAccess Restriction MAC Address Filter ListAdvanced Wireless Wireless Client ListSecurity Firewall FirewallInternet Filter Web FilterInternet Access Policy Security VPN PassthroughVPN Passthrough SummarySummary Applications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range ForwardingApplications & Gaming Port Range Triggering Applications and Gaming DMZPort Range Triggering QoS Quality of Service Applications and Gaming QoSOnline Games MAC AddressEthernet Port Voice DeviceAdministration Management Router AccessLocal Management Access Remote Management AccessAdministration Log Administration DiagnosticsSystem Reboot LogAdministration Factory Defaults Administration Firmware UpgradeDiagnostics Factory DefaultsStatus Router Status Local NetworkStatus Wireless Network Wireless NetworkAppendix a Troubleshooting Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support GeneralSafety Notices FCC StatementFCC Radiation Exposure Statement Wireless Disclaimer Industry Canada StatementAvis d’Industrie Canada Изисквания Приложими Wireless Equipment Wireless-N/G/A/B Products CE MarkingNational Restrictions Product Usage Restrictions Italy LatviaGHz Restrictions Third-Party Software or FirmwareDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule Open Source and Third Party LicensesSchedule 3-A GNU General Public LicensePreamble Software End User License Agreement No Warranty Schedule 3-BEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C