2.Select the protocol used for Trigger Port from the
3.Enter the range of port numbers used by the remote system when it responds to the PC's request.
4.Select the protocol used for Incoming Ports Range from the
5.Select the Enable checkbox to enable.
6.Click the Save button to save the new rule.
There are many popular applications in the Popular Application list. You can select it and the ID, then click the Copy to button, the application will fill in the Trigger Port, incoming Ports Range boxes and select the Enable checkbox. It has the same effect as adding a new rule.
Modifying an existing rule:
1.Edit the entry as desired.
2.Click the Save button.
Deleting an existing rule:
1.Clear all the content in the Trigger Port field, the Open Port field and the Enable checkbox.
2.Click the Save button.
To delete all rules:
1Click the Clear All button.
2Click the Save button
)Note:
¾When the trigger connection is released, the according opening ports will be closed
¾Each rule allowed to be used only by one host on LAN synchronously. The trigger connection of other hosts on LAN will be refused
¾Incoming Port Range cannot overlap each other
4.6.3 DMZThe DMZ host feature allows one local host to be exposed to the Internet for a
27