TP-Link Archer C2 Archer C2 V1 User Guide 1910010993 - Page 88

Trigger Port

Page 88 highlights

Archer C2 AC750 Wireless Dual Band Gigabit Router Figure 4-65 Add or Modify a Triggering Entry To modify or delete an existing entry: 1. Find the desired entry in the table. 2. Click Edit or Delete as desired on the Edit column. Click the Enable Selected button to make selected entries enabled. Click the Disable Selected button to make selected entries disabled. Click the Delete Selected button to delete selected entries Once the router is configured, the operation is as follows: 1. A local host makes an outgoing connection to an external host using a destination port number defined in the Trigger Port field. 2. The router records this connection, opens the incoming port or ports associated with this entry in the Port Triggering table, and associates them with the local host. 3. When necessary, the external host will be able to connect to the local host using one of the ports defined in the Open Ports field.  Note: 1. When the trigger connection is released, the corresponding opened ports will be closed. 2. Each rule can only be used by one host on the LAN at a time. The trigger connection of other hosts on the LAN will be refused. 3. Open Ports ranges cannot overlap each other. 4.12.3 DMZ Choose menu "Forwarding→DMZ", and then you can view and configure DMZ host in the screen (shown in Figure 4-66).The DMZ host feature allows one local host to be exposed to the Internet for a special-purpose service such as Internet gaming or videoconferencing. The router forwards packets of all services to the DMZ host. Any PC whose port is being forwarded must have its - 78 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143

Archer C2
AC750 Wireless Dual Band Gigabit Router
- 78 -
Figure 4-65 Add or Modify a Triggering Entry
To modify or delete an existing entry:
1.
Find the desired entry in the table.
2.
Click
Edit
or
Delete
as desired on the
Edit
column.
Click the
Enable Selected
button to make selected entries enabled.
Click the
Disable Selected
button to make selected entries disabled.
Click the
Delete Selected
button to delete selected entries
Once the router is configured, the operation is as follows:
1.
A local host makes an outgoing connection to an external host using a destination port
number defined in the
Trigger Port
field.
2.
The router records this connection, opens the incoming port or ports associated with this
entry in the
Port Triggering
table, and associates them with the local host.
3.
When necessary, the external host will be able to connect to the local host using one of the
ports defined in the
Open Ports
field.
Note:
1.
When the trigger connection is released, the corresponding opened ports will be closed.
2.
Each rule can only be used by one host on the LAN at a time. The trigger connection of other
hosts on the LAN will be refused.
3.
Open
Ports
ranges cannot overlap each other.
4.12.3
DMZ
Choose menu “
Forwarding
DMZ
”, and then you can view and configure DMZ host in the screen
(shown in Figure 4-66).The DMZ host feature allows one local host to be exposed to the Internet
for a special-purpose service such as Internet gaming or videoconferencing. The router forwards
packets of all services to the DMZ host. Any PC whose port is being forwarded must have its