Linksys AM200 Network Router User Manual


 
19
Chapter 4: Configuring the ADSL Modem
The Applications and Gaming Tab
ADSL Modem
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Port Triggering
Port Triggering is used for special applications that can request a port to be opened on demand. For this feature,
the Modem will watch outgoing data for specific port numbers. The Modem will remember the IP address of the
computer that sends a transmission requesting data, so that when the requested data returns through the
Modem, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Trigger Port. Enter the Trigger Port number in the field.
Trigger Type. Select the Trigger Type protocol TCP or UDP
Public Port. Enter the name you wish to give each public port application.
Public Type. Select the Public Type protocol TCP or UDP.
Enabled. Click the Enabled checkbox to enable port triggering for the chosen application.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
NAT Mapping Table
NAT Mapping Table. Clicking this button will open a screen that allows you to view the current NAT address
mappings. Click Refresh to refresh the screen.
DMZ
The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as
Internet gaming and videoconferencing through DMZ hosting. DMZ hosting forwards all the ports for one
computer at the same time, which differs from Port Range Forwarding, which can only forward a maximum of 10
ranges of ports.
DMZ. This feature allows one local user to be exposed to the Internet for use of a special-purpose service
such as Internet gaming and videoconferencing. To use this feature, select Enabled. To disable DMZ, select
Disabled.
Client PC IP Address. To expose one computer, enter the computer’s IP address.
Figure 4-22: Port Triggering
Figure 4-23: NAT Mapping Table
Figure 4-24: DMZ