ZyXEL ARMOR G1 User Guide - Page 92

Port Trigger Screen

Page 92 highlights

Chapter 9 WAN The following table describes the labels in this screen. Table 27 Settings > Internet > Passthrough LABEL DESCRIPTION ALG Setup FTP Select Enable to allow TCP packets with a specified port destination to pass through. H.323 Select Enable to allow peer-to-peer H.323 calls. SIP Select Enable to make sure SIP (VoIP) works correctly with port-forwarding and address- mapping rules. SNMP Select Enable to allow a manager station to manage and monitor the NBG6818 through the network via SNMP. RTSP Select Enable to have the NBG6818 detect RTSP traffic and help build RTSP sessions through its NAT. IRC Select Enable to allow clients to have real-time communications with others on the Internet. VPN Passthrough PPTP Select Enable to allow VPN clients to make outbound PPTP connections. It is required in order to connect to a PPTP VPN account. If PPTP is disabled, then when a client sends a request to a VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the request. When PPTP is enabled, the NBG6818 will forward the reply from the VPN server to the client that initiated the request, and the connection will establish successfully. L2TP Select Enable to allow VPN clients to make outbound L2TP connections. It is required in order to connect to a L2TP VPN account. If L2TP is disabled, then when a client sends a request to a VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the request. When L2TP is enabled, the NBG6818 will forward the reply from the VPN server to the client that initiated the request, and the connection will establish successfully. IPSEC Select Enable to allow VPN clients to make outbound IPSec connections. It is required in order to connect to a IPSec VPN account. If IPSEC is disabled, then when a client sends a request to a VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the request. When IPSEC is enabled, the NBG6818 will forward the reply from the VPN server to the client that initiated the request, and the connection will establish successfully. Apply Click Apply to save your changes back to the NBG6818. Cancel Click Cancel to begin configuring this screen afresh. 9.7 Port Trigger Screen Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding, you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address. In order to use the same service on a different LAN computer, you have to manually replace the LAN computer's IP address in the forwarding port with another LAN computer's IP address. Trigger port forwarding addresses this problem. Trigger port forwarding allows computers on the LAN to dynamically take turns using the service. The Zyxel Device records the IP address of a LAN computer that sends traffic to the WAN to request a service with a specific port number and protocol (a "trigger" port). When the Zyxel Device's WAN port receives a response with a specific port number and protocol ("open" port), the Zyxel Device forwards the traffic to the LAN IP address of the computer that sent the request. After that computer's connection for that service closes, another computer on the LAN can use the service in the same manner. This way you do not need to configure a new IP address each time you want a different LAN computer to use the application. NBG6818 User's Guide 92

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

Chapter 9 WAN
NBG6818 User’s Guide
92
The following table describes the labels in this screen.
9.7
Port Trigger Screen
Some services use a dedicated range of ports on the client side and a dedicated range of ports on the
server side. With regular port forwarding, you set a forwarding port in NAT to forward a service (coming
in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is
that port forwarding only forwards a service to a single LAN IP address. In order to use the same service
on a different LAN computer, you have to manually replace the LAN computer's IP address in the
forwarding port with another LAN computer's IP address.
Trigger port forwarding addresses this problem. Trigger port forwarding allows computers on the LAN to
dynamically take turns using the service. The Zyxel Device records the IP address of a LAN computer that
sends traffic to the WAN to request a service with a specific port number and protocol (a "trigger" port).
When the Zyxel Device's WAN port receives a response with a specific port number and protocol
("open" port), the Zyxel Device forwards the traffic to the LAN IP address of the computer that sent the
request. After that computer’s connection for that service closes, another computer on the LAN can use
the service in the same manner. This way you do not need to configure a new IP address each time you
want a different LAN computer to use the application.
Table 27
Settings > Internet > Passthrough
LABEL
DESCRIPTION
ALG Setup
FTP
Select
Enable
to allow TCP packets with a specified port destination to pass through.
H.323
Select
Enable
to allow peer-to-peer H.323 calls.
SIP
Select
Enable
to make sure SIP (VoIP) works correctly with port-forwarding and address-
mapping rules.
SNMP
Select
Enable
to allow a manager station to manage and monitor the NBG6818 through the
network via SNMP.
RTSP
Select
Enable
to have the NBG6818 detect RTSP traffic and help build RTSP sessions through
its NAT.
IRC
Select
Enable
to allow clients to have real-time communications with others on the Internet.
VPN Passthrough
PPTP
Select
Enable
to allow VPN clients to make outbound PPTP connections. It is required in order
to connect to a PPTP VPN account. If
PPTP
is disabled, then when a client sends a request to
a VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the request.
When
PPTP
is enabled, the NBG6818 will forward the reply from the VPN server to the client
that initiated the request, and the connection will establish successfully.
L2TP
Select
Enable
to allow VPN clients to make outbound L2TP connections. It is required in order
to connect to a L2TP VPN account. If
L2TP
is disabled, then when a client sends a request to a
VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the request. When
L2TP
is enabled, the NBG6818 will forward the reply from the VPN server to the client that
initiated the request, and the connection will establish successfully.
IPSEC
Select
Enable
to allow VPN clients to make outbound IPSec connections. It is required in
order to connect to a IPSec VPN account. If
IPSEC
is disabled, then when a client sends a
request to a VPN server, the server will reply to the NBG6818 and the NBG6818 will drop the
request. When
IPSEC
is enabled, the NBG6818 will forward the reply from the VPN server to
the client that initiated the request, and the connection will establish successfully.
Apply
Click
Apply
to save your changes back to the NBG6818.
Cancel
Click
Cancel
to begin configuring this screen afresh.