WebSTAR DPR2320 and EPR2320 Gateway Cable Modems User’s Guide
36
Field Name Description
Port Forwarding
Use this page to configure port forwarding for local IP
addresses. Port forwarding allows you to run a server
on the local area network (LAN) by specifying the
mapping of TCP/UPD ports to local PCs or to the IP
address of other devices. This is a static setting that
holds the ports open at all times
Port Triggers
Use this page to configure TCP/UPD port triggers.
Port triggering is similar to port forwarding, but is a
dynamic function. In other words, the ports are not
held open, and the ports close if no outgoing data is
detected on the selected ports for a period of 10
minutes
DMZ Host
(Demilitarized Zone)
Use this page to configure an IP address that is visible
to the wide area network (WAN). DMZ hosting is
commonly referred to as “exposed host,” and allows
you to specify the “default” recipient of WAN traffic
that Network Address Translation (NAT) is unable to
translate to a known local PC.
A DMZ is used by a company that wants to host its
own Internet services without sacrificing unauthorized
access to its private network. DMZ allows one IP
address to be unprotected while others remain
protected. The DMZ is located between the Internet
and an internal network’s line of defense that is a
combination of firewalls and bastion hosts.
Typically, the DMZ contains devices accessible to
Internet traffic, such as Web (HTTP) servers, FTP
servers, SMTP (e-mail) servers, and domain name
system (DNS) servers
Firewall
The following table provides a description of the pages available from within the
Firewall section of the Setup page.
Field Name Description
Web Filters
Use this page to configure Web page filtering,
parental control, and firewall protection. This
page allows you to block/allow Internet access
based on keywords and/or domain names
Time of Day Filters
Use this page to block all traffic to and from
specific computers based on the day of week and
the time of day
Event Logging
Use this page to access the firewall event log and
to enter your e-mail address in order to receive e-
mail alerts related to firewall attacks by hackers