●Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used to access the application.
●Port Range: Type the port range that can be used to access the application in the text boxes.
Incoming: Defines which incoming communications users are permitted to connect with.
●Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used by the incoming communication.
●Port: Type the port number that can be used for the incoming communication. Add: Click to add the special application profile to the table at the bottom of the screen.
Update: Click to update information for the special application if you have selected a list item and have made changes.
Delete: Select a list item and click Delete to remove the item from the list.
New: Click New to erase all fields and enter new information.
3.5.4DMZ
This screen enables you to create a DMZ for those computers that cannot access Internet applications properly through the router and associated security settings. Note: Any clients added to the DMZ exposes the clients to security risks such as viruses and unauthorized access.
42