TL-R402M Cable/DSL Router User Guide
27
2. Select the protocol used for Trigger Port from the pull-down list, either TCP, UDP, or All.
3. Enter the range of port numbers used by the remote system when it responds to the PC's
request.
4. Select the protocol used for Incoming Ports Range from the pull-down list, either TCP,
UDP, or All.
5. Select the Enable checkbox to enable.
6. Click the Save button to save the new rule.
There are many popular applications in the Popular Application list. You can select it and the ID,
then click the Copy to button, the application will fill in the Trigger Port, incoming Ports Range
boxes and select the Enable checkbox. It has the same effect as adding a new rule.
Modifying an existing rule:
1. Edit the entry as desired.
2. Click the Save button.
Deleting an existing rule:
1. Clear all the content in the Trigger Port field, the Open Port field and the Enable
checkbox.
2. Click the Save button.
To delete all rules:
1 Click the Clear All button.
2 Click the Save button
)
Note:
¾ When the trigger connection is released, the according opening ports will be closed
¾ Each rule allowed to be used only by one host on LAN synchronously. The trigger connection
of other hosts on LAN will be refused
¾ Incoming Port Range cannot overlap each other
4.6.3 DMZ
The DMZ host feature allows one local host to be exposed to the Internet for a special-purpose
service such as Internet gaming or videoconferencing. DMZ host forwards all the ports at the
same time. Any PC whose port is being forwarded must have its DHCP client function disabled
and should have a new static IP address assigned to it because its IP address may change when