Dynex DX-wegrtr User Manual (English) - Page 34

Configuring Internal Forwarding Settings - port forwarding

Page 34 highlights

34 Setting up your wireless router • Smurf Attack • Fragment flooding • TCP Null Scan The firewall also masks common ports that are frequently used to attack networks. These ports appear to be Stealth, meaning that for all intents and purposes, they do not exist to a would-be hacker. You can turn the firewall function off if needed, however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled. Configuring Internal Forwarding Settings The Virtual Servers function lets you route external (Internet) calls for services such as a Web server (port 80), FTP server (Port 21), or other applications through your router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be seen. You will need to contact the application vendor to find out which port settings you need. To enter settings into the virtual server: 1 Open the Virtual Servers page, then enter the IP address in the space provided for the internal (server) machine, and the port(s) required to pass. 2 Select the port type (TCP or UDP), check the Enable box, then click Apply Changes. Each inbound port entry has two fields with five characters maximum per field that allows a start and end port range, for example, [xxxxx]-[xxxxx]. For each entry, you can enter a single port value by filling in the two fields with the same value (e.g. [7500]-[7500]) or a wide range of ports (for example [7500]-[9000]). If you need multiple single port values or a combination of ranges and a single value, you must use multiple entries up to the maximum of 20 entries (for example, 1. [7500]-[7500], 2. [8023]-[8023], 3. [9000]-[9000]). You can only pass one port per internal IP

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

34
Setting up your wireless router
Smurf Attack
Fragment flooding
TCP Null Scan
The firewall also masks common ports that are frequently used to attack networks. These
ports appear to be
Stealth
, meaning that for all intents and purposes, they do not exist to a
would-be hacker. You can turn the firewall function off if needed, however, it is
recommended that you leave the firewall enabled. Disabling the firewall protection will not
leave your network completely vulnerable to hacker attacks, but it is recommended that you
leave the firewall enabled.
Configuring Internal Forwarding Settings
The
Virtual Servers
function lets you route external (Internet) calls for services such as a Web
server (port 80), FTP server (Port 21), or other applications through your router to your
internal network. Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because they cannot be
seen
.
You will need to contact the application vendor to find out which port settings you need.
To enter settings into the virtual server:
1
Open the
Virtual Servers
page, then enter the IP address in the space provided for the
internal (server) machine, and the port(s) required to pass.
2
Select the port type (TCP or UDP), check the
Enable
box, then click
Apply Changes
.
Each inbound port entry has two fields with five characters maximum per field that
allows a start and end port range, for example, [xxxxx]-[xxxxx]. For each entry, you
can enter a single port value by filling in the two fields with the same value (e.g.
[7500]-[7500]) or a wide range of ports (for example [7500]-[9000]). If you need
multiple single port values or a combination of ranges and a single value, you must
use multiple entries up to the maximum of 20 entries (for example, 1. [7500]-[7500],
2. [8023]-[8023], 3. [9000]-[9000]). You can only pass one port per internal IP