EasyManua.ls Logo

ActionTec PK-5000 - Rule Management; DMZ Hosting

ActionTec PK-5000
73 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
53
Chapter 6 Configuring Security Settings
Rule Management
4OCREATEACUSTOMSETOFRULESCLICKTHEh5SERvRADIOBUTTONTHENCLICKNew. The
h2ULE-ANAGEMENTvSCREENAPPEARS
In this screen, the user can create a custom set of rules for a game or application
NOTLISTEDINTHE!PPLICATIONSSCREEN%NTERTHEh2ULE.AMEvh0ROTOCOLvh0ORT
3TARTvh0ORT%NDvANDh0ORT-APvINTHEAPPROPRIATETEXTBOXESTHENCLICKApply.
The rules are summarized at the bottom of the screen, and the rule set will appear
INTHE!PPLICATIONSSCREENAFTERCLICKINGBack.
DMZ Hosting
Selecting DMZ HostingINTHEh3ECURITYvSCREENGENERATESTHEhDMZ(OSTINGv
screen. To use DMZ hosting, select the computer on the network to be used as a
DMZ host in the DMZ Host 0#.AMEvDROPDOWNMENUTHENCLICKOn.
DMZ hosting is used to support online gaming and Internet conferencing services.
These programs usually require multiple open ports, making the network acces-
sible from the Internet. DMZ hosting symbolically places the DMZ host computer
outside of the Gateway’s network. We recommend activating DMZ hosting only as
long as necessary.
When finished with this screen, click Apply to save the changes.
!
Warning: The DMZ Host computer will be vulnerable to com-
puter hackers on the Internet while in DMZ mode.

Related product manuals