Figure 5-29: port triggering, Figure 5-30: dmz – Linksys AG300 User Manual
Page 37
31
Chapter 5: Configuring the ADSL Gateway
The Applications & Gaming Tab
ADSL Gateway
The Port Triggering Tab
Port Triggering is used for special applications that can request a port to be opened on demand. For this feature,
the Gateway will watch outgoing data for specific port numbers. The Gateway will remember the IP address of the
computer that sends a transmission requesting data, so that when the requested data returns through the
Gateway, the data is pulled back to the proper computer by way of IP address and port mapping rules.
•
Application. Enter the name you wish to give each application.
•
Triggered Range. Enter the starting and ending port numbers of the Triggered Range.
•
Forwarded Range. Enter the starting and ending port numbers of the Forwarded Range.
•
Enable. Click the Enable checkbox to enable port triggering for the chosen application.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
The DMZ Tab
The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as
Internet gaming and videoconferencing through DMZ Hosting. DMZ hosting forwards all the ports for one
computer at the same time, which differs from Port Range Forwarding, which can only forward a maximum of 10
ranges of ports.
•
DMZ Hosting. This feature allows one local user to be exposed to the Internet for use of a special-purpose
service such as Internet gaming and videoconferencing. To use this feature, select Enable. To disable DMZ,
select Disable.
•
DMZ Host IP Address. To expose one computer, enter the computer’s IP address. To get the IP address of a
computer, refer to “Appendix B: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Figure 5-29: Port Triggering
Figure 5-30: DMZ