Huawei E960 User Manual
Adding an Interactive Application
Your gateway is equipped with a list of special applications; you can select one in
Common Port and then click
to save it to the table. In addition, you can
manually create an application with the following method.
1. Enter a name for the application.
2. Enter the trigger port that is accessed by other clients in the home network or Internet.
2. Enter the trigger port that is accessed by other clients in the home network or Internet.
The trigger port is single.
3. Select the trigger protocol that supports the interconnection and interplay between
special applications and remote servers.
4. Enter the open port that will be using or providing the application service. The open
port can be a single port or a range of ports.
5. Select the open protocol used by the special application.
to add the special application server to the table.
6. Click
Modifying an Interactive Application
in the Modification column. The corresponding application is displayed.
1. Click
2. Modify the contents as required.
2. Modify the contents as required.
.
3. Click
Deleting an Interactive Application
in the Modification column. The corresponding application is deleted.
Click
Making an Interactive Application Effective
1. Create an application or select one in the applications table.
2. Select On for Status to activate the application.
2. Select On for Status to activate the application.
.
3. Click
.
4. Click
DMZ Service
The Demilitarized (DMZ) function allows a local computer to be exposed to the Internet. If
you need to use an Internet service that is not in the special applications list or to expose
your computer to all services without restriction, you can enable the DMZ function.
However, the DMZ computer is not protected by the firewall. It is vulnerable to attack and
may also put other computers in the home network at risk.
you need to use an Internet service that is not in the special applications list or to expose
your computer to all services without restriction, you can enable the DMZ function.
However, the DMZ computer is not protected by the firewall. It is vulnerable to attack and
may also put other computers in the home network at risk.
An incoming request for access to a service in the home network is filtered by the gateway.
Your gateway forwards the request to the specified DMZ computer unless the service is
Your gateway forwards the request to the specified DMZ computer unless the service is
34