My Linksys router used the terminology “port forwarding,” so it wasn’t until I addressed the webpage to interface with the new modem/router (192.168.1.254) that I saw the “pinhole” terminolgy used on the firewall page. There’s actually other posts here on this website where U-verse user had asked for help on creating a pinhole, which is specific to the physical port on the device. [user had created a pinhole called BC that worked on port X and router software wouldn’t let him use it when he moved connection to port y. The simple answer was to create a new pinhole called BC2 with rules for port y] HOWEVER, I don’t think the entire post used the word “pinhole”
{I would have pasted the screenshot of the 2wire interface page, but I’ve concluded that graphic images cannot simply be posted in the body of a forum message.}
As for the acceptance of that terminology, after reading the last reply, I looked it up in Wiki which I pasted in part below:
Firewall pinhole {From Wikipedia, the free encyclopediaJump to: navigation, search
This article does not cite any references or sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (December 2009)}
In computer networking, the term firewall pinhole is used to describe a port that is opened through a firewall to allow a particular application to gain controlled access to the protected network.
Leaving open gaps in a firewall exposes the protected system to malicious abuse. Obviously, a fully closed firewall would prevent applications from accessing information on the other side of the firewall. Thus, it is necessary to carefully open holes in firewalls that are very small and restricted (hence the term pinhole). For best protection, the mechanism for opening the pinhole in the firewall must implement some form of validation and security that will protect the system behind the firewall.
For firewalls performing a network address translation (NAT) function, the mapping between the {external address, external port} tuple and the {internal address, internal port} tuple is often called a pinhole.
Pinholes can be created manually or programmatically. They can be temporary (created dynamically for a specific duration such as for a dynamic connection) or permanent (such as for signalling functions).
Firewalls sometimes automatically close pinholes after a period of time (typically a few minutes) to minimize the security exposure. Applications that require a pinhole to be kept open often need to generate artificial traffic through the pinhole in order to cause the firewall to restart its timer.