
Security Configuration
Rev 2.0 C Aug.10 65
Example of configuring a port forward rule for port forwarding range of 5 ports on
an Ethernet connected device:
1. Set number of PF entries to 1.
2. Click on “Add More” to display a rule line.
3. Enter 8080 for the public start port.
4. Enter 8085 for the public end port.
5. Select Ethernet as the Host I/F.
6. Enter 192.168.13.100 as the Host IP.
7. Enter 80 as the private port.
An unsolicited data request coming in to the AirLink device on port 8080, will be
forwarded to the LAN connected device, 192.168.13.100, at port 80. In addition,
an unsolicited data request coming in from the internet on port 8081,8082, 8083,
8084, and 8085 will be forwarded to 81, 82, 83, 84, and 85 respectively.
Example of configuring the DMZ on an Ethernet connected device:
1. Enter 192.168.13.100 for the DMZ IP.
2. Select Ethernet as the Default Interface.
An unsolicited data request coming in to the AirLink device on any port, will be
forwarded to the LAN connected device, 192.168.13.100, at the same port.
Note: The DMZ settings are independent of the number of Port Forward entries and can
be used with port forwarding to pass anything not forwarded to specific ports.
Port Filtering- Inbound
Port Filtering-Inbound restricts unsolicited access to the AirLink device and all
LAN connected devices.
Port Filtering can be enabled to block ports specified or allow ports specified.
When enabled, all ports not matching the rule will be allowed or blocked
depending on the mode.
Port Filtering can be configured on individual ports or for a port range. Click Add
More for each port filtering rule you want to add.
Note: Inbound restrictions do not apply to responses to outbound data requests. To restrict
outbound access, you need to set the applicable outbound filter.
Host IP IP address of a device connected to the Host I/F interface.
Private Port The single or starting port on the device at the Host IP. If a public end port is defined, the
private port range will be the difference of the public start and end point.
Command Description
Comentarios a estos manuales