TRENDnet WRT-390L User Manual page 30

2.4ghz wireless 802.11n(draft) giga router
Table of Contents

Advertisement

only forwarded while the trigger is active.
Few applications truly require the use of the DMZ host. Following are examples of when a
DMZ host might be required:
A host needs to support several applications that might use overlapping ingress ports
such that two port forwarding rules cannot be used because they would potentially be in
conflict.
To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and
IGMP (also GRE and ESP, when these protocols are enabled by the PPTP and IPSec
ALGs ).
Enable DMZ
Putting a computer in the DMZ may expose that computer to a variety of security risks.
Use of this option is only recommended as a last resort.
DMZ IP Address
Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet
communication.
29

Advertisement

Table of Contents
loading

Table of Contents