Netgear FVS318G FVS318G User Manual - Page 79

Configuring Port Triggering, Add IP/MAC Bindings, MAC Address, Set Poll Interval, Apply - port forward

Page 79 highlights

ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual 4. To add a manual binding entry, enter the following data in the Add IP/MAC Bindings section: a. Enter a Name for the bound host device. b. Enter the MAC Address and IP Address to be bound. A valid MAC address is six colonseparated pairs of hexadecimal digits (0 to 9 and a to f). For example: 01:23:45:ab:cd:ef. c. From the pull-down list, select whether dropped packets should be logged to a special counter. To view the counter, click the Set Poll Interval link at the top of the menu. 5. Click Apply. The specified binding will be added to the list. Configuring Port Triggering Port triggering allows some applications to function correctly that would otherwise be partially blocked by the firewall when the router is in NAT mode. Some applications require that when external devices connect to them, they receive data on a specific port or range of ports. The router must send all incoming data for that application only on the required port or range of ports. Using this feature requires that you know the port numbers used by the application. Port triggering allows computers on the private network (LAN) to request that one or more ports be forwarded to them. Unlike basic port forwarding which forwards ports to only one preconfigured IP address, port triggering waits for an outbound request from the private network on one of the defined outgoing ports. It then automatically sets up forwarding to the IP address that sent the request. When the application ceases to transmit data over the port, the router waits for a timeout interval and then closes the port or range of ports, making them available to other computers on the private network. Once configured, port triggering operates as follows: 1. A PC makes an outgoing connection using a port number defined in the Port Triggering table. 2. The VPN firewall records this connection, opens the additional incoming port or ports associated with this entry in the Port Triggering table, and associates them with the PC. 3. The remote system receives the PC's request and responds using the different port numbers that you have now opened. 4. The VPN firewall router matches the response to the previous request, and forwards the response to the PC. Without Port Triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the inbound service rules. Firewall Protection and Content Filtering 1.1 November, 2009 4-27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual
Firewall Protection and Content Filtering
4-27
1.1 November, 2009
4.
To add a manual binding entry, enter the following data in the
Add IP/MAC Bindings
section:
a.
Enter a
Name
for the bound host device.
b.
Enter the
MAC Address
and
IP Address
to be bound. A valid MAC address is six colon-
separated pairs of hexadecimal digits (0 to 9 and a to f). For example: 01:23:45:ab:cd:ef.
c.
From the pull-down list, select whether dropped packets should be logged to a special
counter. To view the counter, click the
Set Poll Interval
link at the top of the menu.
5.
Click
Apply
. The specified binding will be added to the list.
Configuring Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the firewall when the router is in NAT mode. Some applications require that when
external devices connect to them, they receive data on a specific port or range of ports. The router
must send all incoming data for that application only on the required port or range of ports. Using
this feature requires that you know the port numbers used by the application.
Port triggering allows computers on the private network (LAN) to request that one or more ports
be forwarded to them. Unlike basic port forwarding which forwards ports to only one
preconfigured IP address, port triggering waits for an outbound request from the private network
on one of the defined outgoing ports. It then automatically sets up forwarding to the IP address that
sent the request. When the application ceases to transmit data over the port, the router waits for a
timeout interval and then closes the port or range of ports, making them available to other
computers on the private network.
Once configured, port triggering operates as follows:
1.
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
2.
The VPN firewall records this connection, opens the additional incoming port or ports
associated with this entry in the Port Triggering table, and associates them with the PC.
3.
The remote system receives the PC’s request and responds using the different port numbers
that you have now opened.
4.
The VPN firewall router matches the response to the previous request, and forwards the
response to the PC.
Without Port Triggering, this response would be treated as a new connection request rather than a
response. As such, it would be handled in accordance with the inbound service rules.