Belkin F5D9630-4 user manual Enabling the Demilitarized Zone DMZ, Blocking an Icmp Ping

Models: F5D9630-4

1 88
Download 88 pages 51.5 Kb
Page 51
Image 51

Using the Web-Based Advanced User Interface

Enabling the Demilitarized Zone (DMZ)

The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall. This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is NOT protected from hacker attacks.

To put a computer in the DMZ, enter the last digits of its IP address in the IP field and select “Enable”. Click “Apply Changes” for the change to take effect. If you are using multiple static WAN IP addresses, it is possible to select which WAN IP address the DMZ host will be directed to. Type in the WAN IP address you wish the DMZ host to direct to, enter the last two digits of the IP address of the DMZ host computer, select “Enable” and click “Apply Changes”.

Blocking an ICMP Ping

Computer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens your Router’s security level.

1

2

3

4

5

6

7

8

9

10

section

49

Page 51
Image 51
Belkin F5D9630-4 user manual Enabling the Demilitarized Zone DMZ, Blocking an Icmp Ping