TRENDnet TEW-654TR User's Guide - Page 67

DMZ, Enable, DMZ Host IP

Page 67 highlights

4. ROUTER MODE DMZ The DMZ (Demilitarized Zone) menu allows you to create a DMZ for computers that cannot access Internet applications properly and have security settings. All access will be redirected to the DMZ host. Enable Check the box to enable DMZ function. Uncheck to disable. DMZ Host IP The host IP address to act as a DMZ host with unlimited Internet access. You can either type an IP address or generate it from a list of computers. To generate the IP address: 1 Select the computer name from the list. 2 Click the

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Wireless Travel Router
µ¶
Wireless Travel Router
µ¶
4.
ROUTER MODE
DMZ
The DMZ (Demilitarized Zone) menu allows you to create a DMZ for computers that
cannot access Internet applications properly and have security settings. All access
will be redirected to the DMZ host.
Enable
Check the box to enable DMZ function. Uncheck to disable.
DMZ Host IP
The host IP address to act as a DMZ host with unlimited Internet access. You can
either type an IP address or generate it from a list of computers.
To generate the IP address:
1
Select the computer name from the list.
2
Click the
<<
button. The computer’s IP address is shown on the
DMZ Host IP
box.
Once configuration is complete, click
Apply
to save and apply settings, or click
Cancel
to cancel changes. The travel router will restart for new settings to take effect.
Note:
Any clients added to the DMZ exposes the clients to security risks such as viruses and unauthorized
access.