Trendnet 108Mbps 802.11g Wireless Firewall Router Manuale Utente

Pagina di 54
35 
Trigger: Defines the outgoing communication that determines whether the user has 
legitimate access to the application. 
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used to access the 
application. 
● Port 
Range: Type the port range that can be used to access the application in the 
text boxes. 
Incoming: Defines which incoming communications users are permitted to connect 
with. 
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used by the 
incoming communication. 
 
● Port: Type the port number that can be used for the incoming communication. 
Add: Click to add the special application profile to the table at the bottom of the screen. 
Update: Click to update information for the special application if you have selected a list 
item and have made changes. 
Delete: Select a list item and click Delete to remove the item from the list. 
New: Click New to erase all fields and enter new information. 
3.5.4 DMZ 
This screen enables you to create a DMZ for those computers that cannot access 
Internet applications properly through the router and associated security settings.   
Note: Any clients added to the DMZ exposes the clients to security risks such as 
viruses and unauthorized access. 
 
Enable: Click to enable or disable the DMZ.