Applications; Dmz Hosting - ActionTec C3000A User Manual

802.11n and 802.11ac
Table of Contents

Advertisement

Applications

Click Applications from any Firewall screen to generate the Applications
screen. This screen allows the user to designate certain applications to be
forwarded, circumventing the usual firewall security settings. If changes
are made in this screen, click Apply at the bottom of the screen to save
them.

DMZ Hosting

Click DMZ Hosting from any Firewall screen to generate the DMZ
Hosting screen. The DMZ host feature allows one device on the network
to operate outside the firewall to use an Internet service that otherwise
would be blocked, or to expose a networked device to all services without
restriction or security. To activate, click in the Enable radio button, then
type the device's IP address in the appropriate text boxes.
Caution! A DMZ host is not protected by the firewall and may
be vulnerable to attack. Designating a DMZ host may also put
other computers in the local network at risk. When designating
a DMZ host, consider the security implications and protect it
if necessary.
Configuring Firewall Settings
25

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents