Part 5, Administrative tasks and system monitoring – TRENDnet TDM-E400 User Manual
Page 9

Table of Contents
9
Viewing Current NAT Translations...................................123
Adding NAT Rules ............................................................125
The NAPT rule: Translating between private
and public IP addresses.........................................125
The RDR rule: Allowing external access to a
LAN computer.........................................................127
The Basic rule: Performing 1:1 translations ..............130
The Filter rule: Configuring a Basic rule with
additional criteria.....................................................131
The Bimap rule: Performing two-way
translations..............................................................133
The Pass rule: Allowing specific addresses to
pass through untranslated......................................134
13
Configuring Firewall Settings .............................135
Configuring Global Firewall Settings ................................135
Managing the Blacklist......................................................138
14
Configuring Filters and Blocking Protocols ......139
Configuring IP Filters ........................................................140
Viewing Your IP Filter Configuration .........................140
Configuring IP Filter Global Settings .........................141
Creating IP Filter Rules..............................................142
IP filter rule examples ................................................147
Viewing IP Filter Statistics .........................................148
Managing Current IP Filter Sessions ........................148
Configuring Bridge Filters .................................................150
Configuring Global Bridge Filter Settings..................150
Adding Bridge Filter Rules.........................................151
Bridge Filter Rule Example........................................155
Editing and Deleting Rules and Subrules .................156
Viewing Rule Statistics ..............................................156
Blocking Protocols ............................................................157
Part 5
Administrative Tasks and System
Monitoring
About Part 5 ...................................................................... 160