Chapter 6 Configuring Security Settings
Rule Management
To create a custom set of rules, click the “User” radio button, then click New. The “Rule Management” screen appears.
In this screen, the user can create a custom set of rules for a game or application not listed in the Applications screen. Enter the “Rule Name,” “Protocol,” “Port Start,” “Port End,” and “Port Map” in the appropriate text boxes, then click Apply. The rules are summarized at the bottom of the screen, and the rule set will appear in the Applications screen after clicking Back.
DMZ Hosting
Selecting DMZ Hosting in the “Security” screen generates the “DMZ Hosting” screen. To use DMZ hosting, select the computer on the network to be used as a DMZ host in the “DMZ Host PC Name”
DMZ hosting is used to support online gaming and Internet conferencing services. These programs usually require multiple open ports, making the network acces- sible from the Internet. DMZ hosting symbolically places the DMZ host computer outside of the Gateway’s network. Access to the network resources while DMZ hosting is active is blocked. Actiontec recommends activating DMZ hosting only as long as necessary.
When finished with this screen, click Apply to save the changes.
MWarning: The DMZ Host computer will be vulnerable to com- puter hackers on the Internet while in DMZ mode.
51