53
Chapter 6 Configuring Security Settings
Rule Management
4OCREATEACUSTOMSETOFRULESCLICKTHEh5SERvRADIOBUTTONTHENCLICKNew. The
h2ULE-ANAGEMENTvSCREENAPPEARS
In this screen, the user can create a custom set of rules for a game or application
NOTLISTEDINTHE!PPLICATIONSSCREEN%NTERTHEh2ULE.AMEvh0ROTOCOLvh0ORT
3TARTvh0ORT%NDvANDh0ORT-APvINTHEAPPROPRIATETEXTBOXESTHENCLICKApply.
The rules are summarized at the bottom of the screen, and the rule set will appear
INTHE!PPLICATIONSSCREENAFTERCLICKINGBack.
DMZ Hosting
Selecting DMZ HostingINTHEh3ECURITYvSCREENGENERATESTHEhDMZ(OSTINGv
screen. To use DMZ hosting, select the computer on the network to be used as a
DMZ host in the “DMZ Host 0#.AMEvDROPDOWNMENUTHENCLICKOn.
DMZ hosting is used to support online gaming and Internet conferencing services.
These programs usually require multiple open ports, making the network acces-
sible from the Internet. DMZ hosting symbolically places the DMZ host computer
outside of the Gateway’s network. We recommend activating DMZ hosting only as
long as necessary.
When finished with this screen, click Apply to save the changes.
!
Warning: The DMZ Host computer will be vulnerable to com-
puter hackers on the Internet while in DMZ mode.