EasyManuals Logo

ActionTec PK-5000 User Manual

ActionTec PK-5000
73 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #54 background imageLoading...
Page #54 background image
53
Chapter 6 Configuring Security Settings
Rule Management
4OCREATEACUSTOMSETOFRULESCLICKTHEh5SERvRADIOBUTTONTHENCLICKNew. The
h2ULE-ANAGEMENTvSCREENAPPEARS
In this screen, the user can create a custom set of rules for a game or application
NOTLISTEDINTHE!PPLICATIONSSCREEN%NTERTHEh2ULE.AMEvh0ROTOCOLvh0ORT
3TARTvh0ORT%NDvANDh0ORT-APvINTHEAPPROPRIATETEXTBOXESTHENCLICKApply.
The rules are summarized at the bottom of the screen, and the rule set will appear
INTHE!PPLICATIONSSCREENAFTERCLICKINGBack.
DMZ Hosting
Selecting DMZ HostingINTHEh3ECURITYvSCREENGENERATESTHEhDMZ(OSTINGv
screen. To use DMZ hosting, select the computer on the network to be used as a
DMZ host in the DMZ Host 0#.AMEvDROPDOWNMENUTHENCLICKOn.
DMZ hosting is used to support online gaming and Internet conferencing services.
These programs usually require multiple open ports, making the network acces-
sible from the Internet. DMZ hosting symbolically places the DMZ host computer
outside of the Gateway’s network. We recommend activating DMZ hosting only as
long as necessary.
When finished with this screen, click Apply to save the changes.
!
Warning: The DMZ Host computer will be vulnerable to com-
puter hackers on the Internet while in DMZ mode.

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ActionTec PK-5000 and is the answer not in the manual?

ActionTec PK-5000 Specifications

General IconGeneral
BrandActionTec
ModelPK-5000
CategoryGateway
LanguageEnglish

Related product manuals