Manually Configuring your Router

Table of Contents

sections

1

2

3

4

5

6

7

8

9

10

DMZ (Demilitarized Zone)

If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted 2-way Internet access. This may be necessary if the NAT feature

is causing problems with an application such as a game or video- conferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker attacks.

To put a computer in the DMZ, enter the last digits of its IP address in the IP field and select “Enable”. Click “Apply Changes” for the change to take effect. If you are using multiple static WAN IP addresses, it

is possible to select to which WAN IP address the DMZ host will be directed. Type in the WAN IP address to which you wish the DMZ host to direct, enter the last two digits of the IP address of the DMZ host computer, select “Enable”, and click “Apply Changes”.

Blocking an ICMP Ping

Computer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the level of security of your Router.

To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply Changes”. The Router will not respond to an ICMP ping.

G Wireless Modem Router

46

Page 48
Image 48
Belkin PM01218ea F5D7634-4 user manual DMZ Demilitarized Zone, Blocking an Icmp Ping