Dmz (demilitarized zone) host – Actiontec electronic MI408 User Manual

Page 55

Advertising
background image

52

Actiontec Broadband Router User Manual

53

Chapter 5 Configuring the Router’s Security

4. Select the Internet protocol to be provided from the “Protocol” drop-down

list. To see all options, select All Services.

5. Select a

WAN

connection type from the “

WAN

Connection Type” drop-down

list. Actiontec recommends selecting All Broadband Devices.

6. To select a port to forward communications to (this is optional), select Specify

from the “Forward to Port” drop-down list, then, in the text box that appears,
enter the port number. If no port is identified, select Same as Incoming Port.

7. If this port will be active all the time, select Always from the “When should this

rule occur?” drop-down list. If the rule will only be active at certain times, select
Specify Schedule and click Add. Then, add a schedule rule (for more details
about schedule rules, see the “Advanced Settings” chapter of this manual).

8. Click Apply to save the changes.

How many computers can use a service or play a game simultaneously? Well, the
answer may be a bit confusing. All the computers on the network can behave as
clients and use a specific service simultaneously. Being a client means the com-
puter within the network initiates the connection; for example, a computer on the
network can open an

FTP

connection with an

FTP

server on the Internet. But only

one computer on the network can operate as a server and respond to requests from
computers on the Internet (outside the local network).

DMZ (Demilitarized Zone) Host

The

DMZ

host feature allows one device on the network to operate outside the fire-

wall. Designate a

DMZ

host:

• To use an Internet service, such as an online game or video-conferencing

program, not present in the Port Forwarding list and for which no port
range information is available.

• To expose one computer to all services without restriction or security.

M

Warning: A

DMZ

host is not protected by the firewall and may be

vulnerable to attack. Designating a

DMZ

host may also put other

computers in the local network at risk. When designating a

DMZ

host, consider the security implications and protect it if necessary.

Advertising