•
Outgoing
Ports
•
•
Using a Special Application
•
Configure the Special Applications screen as required.
•
On your PC, use the application normally. Remember that only one (1) PC can use each
Special application at any time. Also, when 1 PC is finished using a particular Special Ap-
plication, there may need to be a "Time-out" before another PC can use the same Special
Application. The "Time-out" period may be up to 3 minutes.
DMZ
This feature, if enabled, allows one (1) computer on your LAN to be exposed to all users on
the Internet, allowing unrestricted 2-way communication between the "DMZ PC" and other
Internet users or Servers.
•
This allows almost any application to be used on the "DMZ PC".
•
The "DMZ PC" will receive all "Unknown" connections and data.
•
If the DMZ feature is enabled, you must select the PC to be used as the "DMZ PC".
•
The DMZ feature can be Enabled and Disabled on the Advanced Internet screen.
URL Filter
The URL Filter allows you to block access to undesirable Web site
•
To use this feature, you must define "filter strings". If the "filter string" appears in a
requested URL, the request is blocked.
•
Enabling the URL Filter also affects the Internet Access Log. If Enabled, the "Destination"
field in the log will display the URL. Otherwise, it will display the IP Address.
•
The URL Filter can be Enabled or Disabled on the Advanced Internet screen.
Type - Select the protocol (TCP or UDP) used when you send data to
the remote system or service.
Start - Enter the beginning of the range of port numbers used by the
application server, for data you send to it. If the application uses a sin-
gle port number, enter it in both the "Start" and "Finish" fields.
Finish - Enter the end of the range of port numbers used by the applica-
tion server, for data you send to it. If the application uses a single port
number, enter it in both the "Start" and "Finish" fields.
If an application still cannot function correctly,
try using the "DMZ" feature.
The "DMZ PC" is effectively outside the Firewall, mak-
ing it more vulnerable to attacks. For this reason, you
should only enable the DMZ feature when required.
Advanced Features
49