D-Link DSR-250v2 Product Manual - Page 79
Protocol, Outgoing trigger port, Incoming trigger port, Enable, Interface, Add icon, Delete icon,
![]() |
View all D-Link DSR-250v2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 79 highlights
Name Protocol Outgoing trigger port Incoming trigger port Enable Interface It displays the name of the port-triggering rule. It displays the protocol on which the rule is being configured. It is TCP, UDP, or TCP/UDP. It displays the start and end trigger port range. It displays a port range that is open to receive the traffic. You can enable or disable the port-triggering rule. It displays the interface name Click Add icon to add a new entry. This opens the Add port triggering page. To delete multiple entries, select the checkboxes you want to delete, and click Delete icon . The fields available on this page are as follows: Field Name Protocol Outgoing trigger port Incoming trigger port Interface Enable Apply Cancel Description Enter the name of the port-triggering rule. Select the protocol on which the rule is to be configured. It is TCP, UDP, or TCP/UDP. Enter the start and end trigger port range. Enter the port range that is open to receive the traffic. Select the WAN interface. Select radio option to enable or disable the port-triggering rule. Click Apply to save your settings. Click Cancel to revert to the previous settings. Chapter 7 Security This chapter introduces you to the security features supported by the DSR-250v2. These features include Web content filtering and Application control. These are the features used to Block/Allow only selected web-based applications. This chapter covers the following topics: Web content Filtering. Application control. Web Content Filter The gateway offers standard web filtering options to filter out the web page displayed by the domain names. It allows you to create Internet access policies between LAN and WAN. Instead of creating policies based on the type of traffic (as is the case when using firewall rules), webbased content itself can be used to determine if the traffic is allowed or dropped.
![](/manual_guide/products/dlink-dsr250v2-product-manual-17a0a81/79.png)