82
Actiontec Wireless Broadband Router User Manual
83
Chapter 6 Configuring the Router’s Security
4. Select the Internet protocol to be provided from the “Protocol” drop-down
list. To see all options, select All Services.
5. Select a WAN connection type from the “WAN Connection Type” drop-down
list. Actiontec recommends selecting All Broadband Devices.
6. To select a port to forward communications to (this is optional), select Specify
from the “Forward to Port” drop-down list, then, in the text box that appears,
enter the port number. If no port is identified, select Same as Incoming Port.
7. If this port will be active all the time, select Always from the “When should this
rule occur?” drop-down list. If the rule will only be active at certain times, select
Specify Schedule and click Add. Then, add a schedule rule (for more details
about schedule rules, see the “Advanced Settings” chapter of this manual).
8. Click Apply to save the changes.
How many computers can use a service or play a game simultaneously? Well, the
answer may be a bit confusing. All the computers on the network can behave as
clients and use a specific service simultaneously. Being a client means the com-
puter within the network initiates the connection; for example, a computer on the
network can open an FTP connection with an FTP server on the Internet. But only
one computer on the network can operate as a server and respond to requests from
computers on the Internet (outside the local network).
DMZ (Demilitarized Zone) Host
The DMZ host feature allows one device on the network to operate outside the fire-
wall. Designate a DMZ host:
• To use an Internet service, such as an online game or video-conferencing
program, not present in the Port Forwarding list and for which no port
range information is available.
• To expose one computer to all services without restriction or security.
M
Warning: A DMZ host is not protected by the firewall and may be
vulnerable to attack. Designating a DMZ host may also put other
computers in the local network at risk. When designating a DMZ
host, consider the security implications and protect it if necessary.