A SERVICE OF

logo

46D-Link DIR-615 User Manual



conforms to the protocol.
Select one of the following for TCP and UDP ports:

be forwarded to the application that opened the port. The port will close
if idle for 5 minutes.

the outgoing connection.
          
address and port of the outgoing connection.

attacks.
If an application has trouble working from behind the router, you can
expose one computer to the Internet and run the application on that
computer.
Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only
recommended as a last resort.
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this
computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the 
 page so that the IP address of the DMZ machine does not change.
NAT Endpoint
Filtering:
Enable Anti-Spoof
Checking:
Enable DMZ Host:
IP Address:
Firewall Settings

prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose
to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely
to the outside world.