06.03.2015 Views

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong> <strong>User</strong> <strong>Manual</strong> (DATA Features)<br />

Figure 5.16 DMZ Host<br />

2. Select the check box, and enter the local IP address of the computer that you would like to<br />

designate as a DMZ host. Note that only one LAN computer may be a DMZ host at any<br />

time.<br />

3. Click ‘OK’ to save the settings.<br />

You can disable the DMZ host so that it will not be fully exposed to the Internet, but will keep its IP<br />

address recorded in the ‘DMZ Host’ screen. To do so, clear the check box next to the DMZ IP field,<br />

and click ‘OK’. This may be useful if you wish to temporarily disable the DMZ host, intending to<br />

enable it again in the future. To reinstate it at a later time, reselect the check box.<br />

5.2.5 Using Port Triggering<br />

Port triggering is used for setting a dynamic port forwarding configuration. By setting port triggering<br />

rules, you can allow inbound traffic to arrive at a specific LAN host, using ports different than those<br />

used for the outbound traffic. This is called port triggering since the outbound traffic triggers to<br />

which ports inbound traffic is directed.<br />

For example, consider a gaming server that is accessed using the UDP protocol on port 2222. The<br />

gaming server responds by connecting the user using UDP on port 3333, when starting gaming<br />

sessions. In such a case you must use port triggering, since this scenario conflicts with the<br />

following default firewall settings:<br />

• The firewall blocks inbound traffic by default.<br />

• The server replies to <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>’s IP, and the connection is not sent back to your host,<br />

since it is not part of a session.<br />

In order to solve this, you need to define a Port Triggering entry, which allows inbound traffic on<br />

UDP port 3333 only after a LAN host generated traffic to UDP port 2222. To do so, perform the<br />

following:<br />

1. Click the ‘Port Triggering’ link under the ‘Firewall’ menu item. The ‘Port Triggering’ screen<br />

appears. This screen will list all of the port triggering entries.<br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!