Using the Web-Based Advanced User Interface
Table of Contents | sections | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that for all intents and purposes, they do not exist to a
the firewall function off if needed; however, while disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, it is recommended that you leave the firewall enabled.
Configuring Internal Forwarding Settings
The “Virtual Servers” function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be “seen.” You will need to contact the application vendor to find out which port settings you need.
G Wireless Router | 66 |