Home > Planet Technology > Router > Planet Technology Router XRT-412 User Manual

Planet Technology Router XRT-412 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Planet Technology Router XRT-412 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 8 Planet Technology manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
     
    Type Select the port number protocol type (TCP, UDP or both). If you 
    are unsure, then leave it to the default both protocols. 
     
    Public Port Enter the service (service/Internet application) port number from 
    the Internet that will be re-directed to the above Private IP 
    address host in your LAN  
    Note: Virtual Server function will have priority over the DMZ 
    function if there is a conflict between the Virtual Server and the 
    DMZ settings. 
     
    Comment The description of this setting.  
     
    Add Virtual Server Fill in the Private IP, Private Port, Type, “Public Port” and 
    Comment of the setting to be added and then click Add. Then 
    this Virtual Server setting will be added into the Current Virtual 
    Server Table below. If you find any typo before adding it and 
    want to retype again, just click Clear and the fields will be 
    cleared. 
     
    Remove Virtual Server If you want to remove some Virtual Server settings from the 
    Current Virtual Server Table, select the Virtual Server settings 
    you want to remove in the table and then click Delete Selected. 
    If you want remove all Virtual Server settings from the table, just 
    click Delete All button. Click Reset will clear your current 
    selections. 
     
     
    You can now configure other advance sections or start using the router (with the advance settings 
    in place) 
     
     
    3.4.3 Special Applications 
    Some applications require multiple connections, such as Internet games, video conferencing, 
    Internet telephony and others. In this section you can configure the router to support multiple 
    connections for these types of applications. 
     
     36 
    						
    							
      
     
    Parameters   Description 
     
    Enable Trigger Port Enable the Special Application function. 
     
    Trigger Port This is the out going (Outbound) range of port numbers for this 
    particular application. 
      
    Trigger Type Select whether the outbound port protocol is “TCP”, “UDP” or 
    both. 
     
    Public Port Enter the In-coming (Inbound) port or port range for this type of 
    application (e.g. 2300-2400, 47624) 
     
     Note: Individual port numbers are separated by a comma  
    (e.g. 47624, 5775, 6541 etc.). To input a port range use a “dash” 
    to separate the two port number range (e.g. 2300-2400) 
     
    Public Type   Select the Inbound port protocol type: “TCP”, “UDP” or both 
     
    Comment The description of this setting.  
     
    Popular Applications This section lists the more popular applications that require 
    multiple connections. Select an application from the Popular 
    Applications selection. Once you have selected an application, 
    click the Add button. This will automatically copy the Port Trigger 
    information required for this popular application in into the input 
    fields. 
     
    Add Special Application Fill in the Trigger Port, Trigger Type”, “Public Port”, Public 
    Type, Public Port and Comment of the setting to be added 
    and then click Add. Then this Special Application setting will be 
     37 
    						
    							
    added into the Current Trigger-Port Table below. If you find any 
    typo before adding it and want to retype again, just click Clear 
    and the fields will be cleared. 
     If you want to add a popular application, select one “Popular 
    Application” and then click “Add”. 
     
    Remove Special Application If you want to remove some Special Application settings from the 
    Current Trigger-Port Table, select the Special Application 
    settings you want to remove in the table and then click Delete 
    Selected. If you want remove all Special Application settings 
    from the table, just click Delete All button. Click Reset will 
    clear your current selections. 
     
     
    You can now configure other advance sections or start using the router (with the advance settings 
    in place) 
     
    Example: Special Applications  
    If you need to run applications that require multiple connections, then specify the port (outbound) 
    normally associated with that application in the Trigger Port field. Then select the protocol type 
    (TCP or UDP) and enter the public ports associated with the trigger port to open them up for 
    inbound traffic. 
      
    Example: 
    ID Trigger Port Trigger TypePublic Port Public TypeComment 
    1 28800 UDP 2300-2400, 47624TCP MSN Game Zone
    2 6112 UDP 6112 UDP Battle.net 
     
    In the example above, when a user trigger’s port 28800 (outbound) for MSN Game Zone then the 
    router will allow incoming packets for ports 2300-2400 and 47624 to be directed to that user.  
    Note: Only one LAN client can use a particular special application at a time. 
     
     
    3.4.4 UPnP Settings 
    With UPnP, all PCs in you Intranet will discover this router automatically. So you do not have to 
    do any configuration for your PC and can access the Internet through this router easily. 
     
     38 
    						
    							
     
    Parameters  Default   Description 
     
    UPnP Feature               Disable                           You can Enable or Disable UPnP feature here. 
    After you enable the UPnP feature, all client 
    systems that support UPnP, like Windows XP, 
    can discover this router automatically and 
    access the Internet through this router without 
    any configuration. The NAT Traversal function 
    provided by UPnP can let applications that 
    support UPnP smoothly connect to Internet sites 
    without any incompatibility problem due to the 
    NAPT port translation. 
     
     
    Click  at the bottom of the screen to save the above configurations. You can now 
    configure other advance sections or start using the router (with the advance settings in place) 
     
     
    3.4.5 ALG Settings 
    You can select applications that need “Application Layer Gateway” to support. 
     
     39 
    						
    							
      
    Parameters  Default   Description 
     
    Enable You can select to enable “Application Layer 
    Gateway” of an application and then the router 
    will let that application correctly pass though the 
    NAT gateway. 
     
    Click  at the bottom of the screen to save the above configurations. You can now 
    configure other advance sections or start using the router (with the advance settings in place) 
     
     
    3.5 Firewall 
    XRT-412 provides extensive firewall protection by restricting connection parameters, thus limiting 
    the risk of hacker attack, and defending against a wide array of common Internet attacks. 
    However, for applications that require unrestricted access to the Internet, you can configure a 
    specific client/server as a Demilitarized Zone (DMZ).  
     
    Note: To enable the Firewall settings select Enable and click Apply 
     
     40 
    						
    							
     
     
    Parameters   Description 
     
    3.5.1 Access Control Access Control allows you to specify which hosts users can or 
    cannot have access to certain Internet applications  
     
    3.5.2 URL Blocking  URL Blocking allow you to specify which URLs can not be  
        accessed by users. 
     
    3.5.3 DoS XRT-412s firewall can block common hacker attacks and can 
    log the attack activities. 
     
    3.5.4 DMZ  The DMZ function allows you to re-direct all packets going to 
    your WAN port IP address to a particular IP address in your LAN. 
     
     
    Click on one of the firewall selections and proceed to the manual’s relevant sub-section 
     
     
     
    3.5.1 Access Control 
    If you want to restrict users from accessing certain Internet applications/services (e.g. Internet 
    websites, email, FTP etc.), then this is the place to set that configuration. Access Control allows 
    users to define the traffic type permitted in your LAN. You can control which PC client can have 
    access to these services.  
     
     41 
    						
    							
     
     
     
    Parameters    Description 
     
    Enable MAC Filtering Check “Enable MAC Filtering” to enable MAC Filtering, 
    select “Deny” or “Allow” to define the access rule. 
     
    Add PC Fill in “Client PC MAC Address” and “Comment” of the 
    PC, and then click “Add”. If you find any typo before 
    adding it and want to retype again, just click Reset and 
    the fields will be cleared. 
     
    Remove PC If you want to remove some PC from the MAC Filtering 
    Table, select the PC you want to remove in the table 
    and then click Delete Selected. If you want remove all 
    PCs from the table, just click Delete All button. If you 
    want to clear the selection and re-select again, just click 
    “Reset”. 
     
    Enable IP Filtering Table Check “Enable IP Filtering Table” to filter PC clients by 
    IP, select “Deny” or “Allow” to define the access rule. 
     
    Add PC You can click Add PC to add an access control rule for 
    users by IP addresses. 
     
    Remove PC If you want to remove some PC from the IP Filtering 
    Table, select the PC you want to remove in the table 
    and then click Delete Selected. If you want remove all 
    PCs from the table, just click Delete All button. 
     
     
    You can now configure other advance sections or start using the router (with the advance settings 
    in place) 
     42 
    						
    							
     
     
     
     
    Add PC 
    Parameters    Description 
     
    Client PC Description The description for this client PC rule. 
     
    Client PC IP Address Enter the IP address range that you wish to apply this 
    Access Control rule. This is the user’s IP address that 
    you wish to setup an Access Control rule. You can select 
    a range of users simply by inputting the starting users’ IP 
    address and the last user’s IP address in the appropriate 
    boxes. If you want to select only one user then input the 
    user’s IP address in both boxes.   
        
     Note: You need to give your LAN PC clients a 
    fixed/static IP address for the Access Control rule to 
    work properly. 
     
    Client PC Service You can block the clients from accessing some Internet 
    services by checking the services you want to block. 
     43 
    						
    							
     
    Protocol This allows you to select UDP, TCP or both protocol 
    types you want to block. 
     
    Port Range You can assign up to five port ranges. The router will 
    block clients from accessing Internet services that use 
    these ports. 
     
     
    You can now configure other advance sections or start using the router (with the advance settings 
    in place) 
     
     
    3.5.2 URL Blocking 
    You can block access to some Web sites from particular PCs by entering a full URL address or 
    just keyword of the Web site. 
     
     
     
    Parameters    Description 
     
    Enable URL Blocking Enable/disable URL Blocking 
     
    Add URL Keyword Fill in “URL/Keyword” and then click “Add”. You can 
    enter the full URL address or the keyword of the web site 
    you want to block. If you find any typo before adding it 
    and want to retype again, just click Reset and the field 
    will be cleared. 
     
    Remove URL Keyword If you want to remove some URL keyword from the 
    Current URL Blocking Table, select the URL keyword 
    you want to remove in the table and then click Delete 
    Selected. If you want remove all URL keyword from the 
    table, just click Delete All button. If you want to clear 
    the selection and re-select again, just click “Reset”. 
     
     
    You can now configure other advance sections or start using the router (with the advance settings 
    in place) 
     44 
    						
    							
     
     
    3.5.3 Denial of Service (DoS) 
    The XRT-412s firewall can block common hacker attacks, including Denial of Service, Ping of 
    Death, Port Scan and Sync Flood. If Internet attacks occur the router can log the events. 
     
     
     
    Parameters     Description 
     
    Ping of Death Protections from Ping of Death attack 
       
    Discard Ping From WAN The router’s WAN port will not respond to any 
    Ping requests 
     
    Port Scan     Protection the router from Port Scan. 
     
    Sync Flood     Protection the router from Sync Flood attack. 
     
     
    If you want to define the content of DoS by yourself, you can select “Advance Settings” and 
    configure the setting based on your request.  
     
    When all setting is done, click  at the bottom of the screen to save the above 
    configurations. You can now configure other advance sections or start using the router (with the 
    advance settings in place). 
    3.5.4 DMZ 
    If you have a local client PC that cannot run an Internet application (e.g. Games) properly from 
    behind the NAT firewall, then you can open the client up to unrestricted two-way Internet access 
    by defining a DMZ Host. The DMZ function allows you to re-direct all packets going to your WAN 
    port IP address to a particular IP address in your LAN. The difference between the virtual server 
    and the DMZ function is that the virtual server re-directs a particular service/Internet application 
    (e.g. FTP, websites) to a particular LAN client/server, whereas DMZ re-directs all packets 
    (regardless of services) going to your WAN IP address to a particular LAN client/server. 
     
     45 
    						
    All Planet Technology manuals Comments (0)

    Related Manuals for Planet Technology Router XRT-412 User Manual