Netgear FVS124G FVS124G Reference Manual - Page 104

Port Triggering

Page 104 highlights

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports Table 6-5. Item Activation Add Disable Source MAC address filter Description • Enable the source MAC filter by ticking the check box. • Press APPLY. • Now add the MAC Addresses from which the traffic should be dropped by clicking on ADD button. Each time one MAC Address entry can be added. MAC Address input should be entered with ':' separator. A valid MAC address will have 0 to 9 and A to F. Example: 00:e0:4c:69:0a:11 • Press APPLY. Now the traffic from the specified MAC addresses will be dropped. • To Disable Source MAC Filter, uncheck Source MAC Filter Enable check box. The list of the MAC Addresses can be kept in the database. • If the filter has to be avoided for a specific MAC address in the database, select the MAC address entry and click on Delete button. Port Triggering Port triggering allows some applications to function correctly that would otherwise be partially blocked by the firewall. Using this feature requires that you know the port numbers used by the Application. Once configured, operation is as follows: • A PC makes an outgoing connection using a port number defined in the Port Triggering table. • This Router records this connection, opens the additional INCOMING port or ports associated with this entry in the Port Triggering table, and associates them with the PC. • The remote system receives the PCs request and responds using the different port numbers that you have now opened. • This Router matches the response to the previous request, and forwards the response to the PC. Without Port Triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the Port Forwarding rules. • Only 1 PC can use a Port Triggering application at any time. 6-28 Firewall Protection and Content Filtering 202-10085-01, March 2005

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
6-28
Firewall Protection and Content Filtering
202-10085-01, March 2005
Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the firewall. Using this feature requires that you know the port numbers used by the
Application.
Once configured, operation is as follows:
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
This Router records this connection, opens the additional INCOMING port or ports associated
with this entry in the Port Triggering table, and associates them with the PC.
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
This Router matches the response to the previous request, and forwards the response to the PC.
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
Only 1 PC can use a Port Triggering application at any time.
Table 6-5.
Source MAC address filter
Item
Description
Activation
Enable the source MAC filter by ticking the check box.
Press APPLY.
Add
Now add the MAC Addresses from which the traffic should be dropped by clicking
on ADD button.
Each time one MAC Address entry can be added.
MAC Address input should be entered with ':' separator. A valid MAC address will
have 0 to 9 and A to F.
Example
: 00:e0:4c:69:0a:11
Press APPLY.
Now the traffic from the specified MAC addresses will be dropped.
Disable
To Disable Source MAC Filter, uncheck Source MAC Filter Enable check box.
The list of the MAC Addresses can be kept in the database.
If the filter has to be avoided for a specific MAC address in the database, select the
MAC address entry and click on Delete button.