User Guide
Page 60
...applications has been included to from the Popular Applications drop-down list, and click Copy To. The settings will be open for that application. Then select the row that you specified. Downloaded from . Select your network completely vulnerable to the ...Firewall as required by selecting the appropriate radio button. 2 Click Apply. 60 CHAPTER 5: ROUTER CONFIGURATION your application from the Copy To drop down list. Special Applications Figure 49 Special Applications Screen Special Applications let you choose specific ports to be transferred to hacker attacks, but 3Com...
...applications has been included to from the Popular Applications drop-down list, and click Copy To. The settings will be open for that application. Then select the row that you specified. Downloaded from . Select your network completely vulnerable to the ...Firewall as required by selecting the appropriate radio button. 2 Click Apply. 60 CHAPTER 5: ROUTER CONFIGURATION your application from the Copy To drop down list. Special Applications Figure 49 Special Applications Screen Special Applications let you choose specific ports to be transferred to hacker attacks, but 3Com...
User Guide
Page 61
...for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your application is TCP or UDP. 2 Specify the Public Ports used by the application, that will need to be opened up in the Trigger Port column, and specify whether the trigger is... To do this port information into the Router. If you will need to check with the application vendor to determine which ports need to find out which port settings you need. Also specify whether these ports are protected by the application when it is initialized) in the firewall for a specific ...
...for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your application is TCP or UDP. 2 Specify the Public Ports used by the application, that will need to be opened up in the Trigger Port column, and specify whether the trigger is... To do this port information into the Router. If you will need to check with the application vendor to determine which ports need to find out which port settings you need. Also specify whether these ports are protected by the application when it is initialized) in the firewall for a specific ...
User Guide
Page 69
...Internet. Remote Administration Before you to make changes to your Router. Simply select On in the Universal Plug and Play section of your Router's settings from anywhere on the Internet. This usually requires opening TCP and UDP ports and in a specific way to operate properly. You ...can be configured in some instances setting trigger ports. To turn off the ping response, select Block ICMP Ping and click Apply; the router will not respond to save the change. Firewall 69 ...
...Internet. Remote Administration Before you to make changes to your Router. Simply select On in the Universal Plug and Play section of your Router's settings from anywhere on the Internet. This usually requires opening TCP and UDP ports and in a specific way to operate properly. You ...can be configured in some instances setting trigger ports. To turn off the ping response, select Block ICMP Ping and click Apply; the router will not respond to save the change. Firewall 69 ...