Microsoft MN-500 User's Guide Page 20

  • Download
  • Add to my manuals
  • Print
  • Page
    / 24
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 19
MN-500 Base Station Configuration Guide 20
To establish persistent port forwarding, you will need the following information:
O
The IP address of the server computer on your local network. To determine the IP address assigned to the
computer that you will use as a server, check the DHCP client list on the Home page of the Base Station
Management Tool.
O
The inbound and private port numbers and protocol that correspond to the type of data that your server handles.
Some of the common TCP inbound ports include:
O
HTTP Port 80
O
FTP Port 21
O
Telnet Port 23
O
POP3 Port 110
To configure persistent port forwarding
1. Open the Base Station Management Tool, and then click Security.
2. On the Security menu, click Port Forwarding, and then click Set up persistent port forwarding.
3. In the Description box, type a description of the server field. (This step is optional.)
4. In the Inbound port box, type the inbound port to which data packets sent from the Internet to the server will be
passed. The inbound port can be a single port or a comma-separated list of ports or port ranges. For example,
you could type 4-25, or 243, or 10, 24-50, 74. You are limited to 256 characters.
5. In the Type box, select the protocol (UDP or TCP) for the port.
6. In the Private IP address box, type the private IP address of the client computer that is hosting the server.
7. In the Private port boxes, type the private port on the server that the data will be sent to. To identify the private
port number, consult the documentation for your server software.
8. To save the changes you have made, click Apply, or to delete the changes, click Cancel.
Virtual Demilitarized Zone
In certain situations, you might want to set up a virtual demilitarized zone (DMZ) on one of the clients on your
network. When you establish a DMZ, you essentially open all inbound ports and direct the base station to forward
certain inbound data packets (those that are not in response to a transmission initiated by a LAN client and not
handled through application-triggered or persistent port forwarding) to a particular computer on your LAN. This
computer becomes the DMZ host.
A DMZ host is useful for experimenting with new games on the Internet or for setting up a server on your network
before you know which ports to open for that server. A DMZ, however, should be used only in very specific and finite
situations. The computer that hosts the DMZ is fully exposed to the Internet, and is thus susceptible to malicious
attacks and unauthorized access.
Because the computer is a virtual DMZ behind the base station, as opposed to a real DMZ out on the Internet, it
has access to the other computers on your LAN. If a hacker were to upload a virus to the virtual DMZ, the virus
could spread to all the computers on your network.
Because the virtual DMZ that you establish is behind the base station NAT, the IP address for the DMZ is not public.
This means that the DMZ can resolve most, but not all, connection problems.
To establish a virtual DMZ
1. Open the Base Station Management Tool, and then click Security.
2. On the Security menu, click Virtual DMZ (Demilitarized Zone).
3. Select the Enable check box.
4. In the text box, type the IP address assigned to the computer that will host the virtual DMZ. To determine the IP
address, see the DHCP client list on the Home page of the Base Station Management Tool.
5. To save the changes you have made, click Apply, or to delete the changes, click Cancel.
Page view 19
1 2 ... 15 16 17 18 19 20 21 22 23 24

Comments to this Manuals

No comments