Router PAT settings

Source: Internet
Author: User

Vropat PAT sets the virtual server option to allow Internet users to access services on your LAN. This feature is useful for providing online services such as FTP, Web, or game servers. For each virtual server, you define a public port on the router to redirect to an internal lan ip address and a lanport. Instance: you are running a Web server on a PC with a lan ip address of 192.168.0.50. Your ISP blocks the virtual server named after Port 80 (for example, Web server) enter the IP address of the device on your LAN. Enter the dedicated port [80] enter the public port [8888] select the Protocol (for example, TCP) to repeat these steps for each virtual server you want to add. After the list is complete, click Save settings in the upper part of the page. Using this virtual server input, all Internet traffic on port 8888 will be redirected to the internal network server on port 80 of the IP address 192.168.0.50. The Virtual Server parameter name assigns a meaningful name to the virtual server, such as the Web server. Multiple known types of virtual servers are available in the 'Application name' drop-down menu. Select one of the parameters and fill the remaining parameters with the standard value of this type of server. The IP address of the system that provides virtual services on your internal network, such as 192.168.0.50. You can select a computer from the DHCP client list in the "computer name" drop-down menu, or you can manually enter the IP address of the server computer. Select the protocol used by the Service for the traffic type. Common options: Select UDP, TCP, UDP, and TCP from the drop-down menu. Private Port: the port used by your internal network. The port that the public port accesses from the Internet. 24 -- the Virtual Server LIST uses the check box on the left to activate or stop completed virtual server entries. Note: you may encounter problems when using the public identity of the device on the LAN (the wan ip address of the gateway or its dynamic DNS name) to access the virtual server. Your request may not want to go back or you may not be able to redirect to the "forbidden" page. This occurs when access control rules are configured on the LAN device. If Internet access is blocked, requests sent by the LAN device are not blocked. To solve this problem, use the LAN-side identity to access the LAN device. The port forwarding option allows Internet users to access services on your LAN. This feature is useful for providing online services such as FTP, Web, or game servers. For each item, you define a public port on the router to redirect to an internal lan ip address and a lanport. The port forwarding parameter name assigns a meaningful name to the virtual server, such as the Web server. The "Application name" drop-down menu contains a variety of known types of virtual servers available. Select one of the parameters and fill the remaining parameters with the standard value of this type of server. The IP address of the system that provides virtual services on your internal network, such as 192.168.0.50. You can select a computer from the DHCP client list in the "computer name" drop-down menu, or you can manually enter the IP address of the server computer ." The Application name user can use a predefined popular application list to quickly configure the computer name DHCP client list traffic type select the protocol used by the Service. Common options: Select UDP, TCP, UDP, and TCP from the drop-down menu. Specify any other protocols, select "other" from the list, and enter the corresponding protocol number (allocated by IANA) in the protocol column ). Private Port: the port used by your internal network. The port that the public port accesses from the Internet. Application Rules some applications require multiple connections, such as Internet games, video conferencing, Internet calls, and others. It is difficult for these programs to run through NAT (network address translation. If you want to run applications requiring multiple connections, specify the port associated with the application in the "trigger port" field and select TCP (Transport Control Protocol) or UDP (user data packet protocol) protocol type, and then enter the public ports associated with the trigger port in the firewall port domain, in order to enable them for inbound traffic. In the Application name drop-down list, you can find a well-known application. Name: This is the reference name of the application. The trigger port is the port used to trigger the application. It can be a separate port or a group of ports. Traffic Type this is the protocol used to trigger the application. The WAN Port Number of the firewall port used to access the application. You can define a separate port or a group of ports. You can use commas to add multiple ports or a group of ports. The traffic type is used for the protocol of the application. Traffic control this function allows users to manage the upload/download bandwidth for applications within each IP address range. It simply selects the IP address range to manage the bandwidth of different operation modes (maximum upload and download bandwidth and maximum bandwidth. Enable traffic control select this option to enable the traffic control function. Select this option for automatic bandwidth to automatically obtain the optimal performance. You can manually set the uplink speed to view the current uplink speed. You can manually set the download rate to see the current download rate. Network filtering (MAC address filtering) uses MAC filtering to deny computers in the local LAN to access the Internet. You can manually add a MAC address or select a MAC address from the list of clients currently connected to the device. If you only want the selected computer to access the network and all other computers do not access the network, select "enable MAC filtering and allow computers with the following MAC addresses to access the network ". If you want to access networks from all computers listed in the List, select "enable MAC filtering and deny access to networks from computers with the following MAC addresses ". The MAC address of the network device that needs to be added to the MAC filter table. DHCP client list the Host Name of the DHCP client can be found in the "computer name" drop-down menu. You can select the client computer to add to the MAC Filter list and click the arrow. This will automatically add the computer's MAC address to the corresponding field. The checkbox is used to enable or disable a specific item. The site filter Web filter is used to allow or deny computers on your network to access a specific web site through keywords or a specific domain name. Select "Enable Web site filtering rules and allow only computers to access these sites" to only allow computers on your network to access the specified URL and domain name. "Enable Web site filtering rules and deny computer access to these sites", only deny access to the specified URL and domain name to your computer on the network. Instance: 1: If you want to prevent LAN users from accessing any website with shopping contained in a URL, You need to select "Enable website filtering and only deny computer access to these sites ", then, enter "shopping" in the website Filtering Rule List ". Similar websites are forbidden by LAN users because they include keywords in the URL. http://shopping.yahoo.comhttp://shopping.msn.com Example: 2: If you want your child to access only specific sites, you can select "Enable website filtering and only allow computer access to these sites ", enter the domain name that you want your child to access. The firewall setting section of Google.comCartoons.comDiscovery.com includes the option to configure the DMZ host. Enable SPISPI (full-state packet detection, also known as dynamic packet filtering) to prevent computer attacks by tracking more States of each conversation. It makes the traffic through the session consistent with the Protocol take effect. Whether the SPI is enabled or not, the router will always track the TCP connection status and ensure that each TCP packet in the current status is valid. DMZ: if an Internet application cannot be correctly run on a computer on a vro, you can allow the computer to have unrestricted Internet access permissions. Enter the IP address of the computer that acts as the DMZ (non-restricted area) host. This computer has unrestricted Internet access permissions. Adding a client to DMZ may cause multiple security threats to the computer. This option is used only when there are no other methods. Firewall Rules firewall rules are used to allow or deny inbound or outbound traffic to or from a vro based on the source and target IP addresses, traffic types, and specific ports for data operation. You can specify a name for a firewall rule. The action user can choose to allow or reject traffic. Source interface if the LAN port or WAN port allows or rejects the traffic starting point, use the source drop-down menu to select. Use the drop-down menu of the Target Interface to select the end point of the traffic that allows or denies access to the LAN port or WAN port. You can enter an IP address in the top bar to specify a separate source or destination IP address, or enter the first IP address in the top bar and the last IP address in the bottom bar to specify a group of IP addresses. Select the traffic type from the protocol usage drop-down menu. Enter the same port number in the port range column to specify a separate port or enter the first port in the top bar and enter the last port in the bottom bar to specify a group of ports. This option on the advanced wireless tab page needs to be changed by the advanced user or you are guided by our technical support staff. If the configuration is incorrect, the router performance will be negatively affected. Select a lower percentage of transmission power from the drop-down menu to reduce the output power of the router. Your options include 100%, 50%, 25%, and 12.5%. A Beacon Interval beacon is a data packet sent by an access point for synchronizing data to a wireless network. Specifies a beacon value between 20 and 1000. The default value is 100 milliseconds. The default value of this parameter is 2346. If you encounter discontinuous data streams, we recommend that you make minor changes between 256 and 2346. The default value of the RTS threshold is 2346. This value can be retained to 2346 by default. If you encounter a high packet error rate, you can add a "segment" value between 1500 and 2346. If the segment value is too low, performance may decrease. DTIM input a value between 1 and 255 of the transmission traffic indication information (DTIM. DTIM is the reciprocal notification client of the next window used to listen to broadcast and multicast information. When the Access Point caches broadcast or multicast information of related clients, it sends the next DTIM with the DTIM interval value. The AP client listens to the beacon and is awakened to receive broadcast and multicast information. The default DTIM interval value is 1. The leading type refers to the length of the CRC block, which is used for communication between the Access Point and the roaming wireless network card. Make sure to select the corresponding leading type. There are three types of wireless modes. Including 802.11n, 802.11 (g/B), 802.11 (n/g/B ). The bandwidth has two modes: 20 MHz, 20/40 MHz (automatic) Short protection interval. You can choose to enable or disable the short protection interval function. WDS is a wireless network system that allows access points. It can bridge and accept wireless clients at the same time. To enable the WDS function, make sure that the Peer MAC address option should be set to another MAC address of the same vro. This function only works in AP mode, and affects the maximum throughput of the router. Note: The short forward code type is required for high network traffic areas. CRC is a common technique used to detect data transmission errors. This section describes the settings used to change the way a vro processes a specific type of traffic. We recommend that you do not change these settings unless you are very familiar with them or you make changes under the guidance of our technical support staff. UPNP universal plug-and-play (UPnP) supports point-to-point plug-and-play functions of network devices. When you enable the WAN Ping response, the public wan ip address on the device responds to the Ping Command sent by the Internet user. Ping a public wan ip address is a common method for hackers to test whether your wan ip address is valid. The WAN port speed allows you to select the speed of the router WAN Interface: Optional 100 Mbps, 10 Mbps or automatic 10/100 Mbps.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.