Trigger: Defines the outgoing communication that determines whether the user has
legitimate access to the application.
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used to
access the application.
● Port Range: Type the port range that can be used to access the application
in the text boxes.
Incoming: Defines which incoming communications users are permitted to
connect with.
● Protocol: Select the protocol (TCP, UDP, or ICMP) that can be used by
the incoming communication.
● Port: Type the port number that can be used for the incoming
communication.
Add: Click to add the special application profile to the table at the bottom of the
screen.
Update: Click to update information for the special application if user have
selected a list item and have made changes.
Delete: Select a list item and click Delete button to remove the entry from the list.
Cancel:
Click the Cancel button to erase all fields and enter new information.
DMZ
This screen enables users to create a DMZ for those computers that cannot access
Internet applications properly through the WLAN Router and associated security
settings.
Note: Any clients a
dded to the DMZ exposes the clients to security risks such as viruses and
unauthorized access.