Actiontec electronic GT704WG Network Router User Manual


 
50
Actiontec 54 Mbps Wireless DSL Gateway User Manual
51
Chapter 6 Configuring Security Settings
Rule Management
To create a custom set of rules, click the “User” radio button, then click New. The
“Rule Management” screen appears.
In this screen, the user can create a custom set of rules for a game or application
not listed in the Applications screen. Enter the “Rule Name,” “Protocol,” “Port
Start,” “Port End,” and “Port Map” in the appropriate text boxes, then click Apply.
The rules are summarized at the bottom of the screen, and the rule set will appear
in the Applications screen after clicking Back.
DMZ Hosting
Selecting DMZ Hosting in the “Security” screen generates the “DMZ Hosting”
screen. To use DMZ hosting, select the computer on the network to be used as a
DMZ host in the “DMZ Host PC Name” drop-down menu, then click On.
DMZ hosting is used to support online gaming and Internet conferencing services.
These programs usually require multiple open ports, making the network acces-
sible from the Internet. DMZ hosting symbolically places the DMZ host computer
outside of the Gateway’s network. Access to the network resources while DMZ
hosting is active is blocked. Actiontec recommends activating DMZ hosting only as
long as necessary.
When finished with this screen, click Apply to save the changes.
M
Warning: The DMZ Host computer will be vulnerable to com-
puter hackers on the Internet while in DMZ mode.