ZyXEL P-794H User Guide - Page 190

Security Trigger Configuration, Table 87

Page 190 highlights

Chapter 15 Security 15.2.4.2 Security Trigger Configuration Click Security Trigger Configuration to show the following screen. You can view your security trigger settings. Figure 119 Security Trigger Configuration The following table describes the labels in this screen. Table 87 Security Trigger Configuration LABEL DESCRIPTION Transport Type This shows the transport type of the trigger. Port Number Start This shows the start of the trigger port range that the primary session uses. Port Number End This shows the end of the trigger port range that the primary session uses. Secondary Port This shows the start of the trigger port range that the secondary session Number Start uses. Secondary Port This shows the end of the trigger port range that the secondary session Number End uses. Allow Multiple Hosts This shows if a secondary session is to be initiated to/from different remote hosts. Max Activity Interval This shows the maximum interval time (in milliseconds) between the uses of the secondary port sessions. Enable Session This shows whether multi-level TCP session chaining is allowed. Chaining Enable UDP Session Chaining This shows whether multi-level UDP and TCP session chaining is allowed. Binary Address This shows whether binary address replacement is to be used on an Replacement existing trigger. Address Translation Type This shows what type of address replacement is set on a trigger. 190 P-794H User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294

Chapter 15 Security
P-794H User’s Guide
190
15.2.4.2
Security Trigger Configuration
Click
Security Trigger Configuration
to show the following screen. You can view
your security trigger settings.
Figure 119
Security Trigger Configuration
The following table describes the labels in this screen.
Table 87
Security Trigger Configuration
LABEL
DESCRIPTION
Transport Type
This shows the transport type of the trigger.
Port Number
Start
This shows the start of the trigger port range that the primary session
uses.
Port Number
End
This shows the end of the trigger port range that the primary session
uses.
Secondary Port
Number Start
This shows the start of the trigger port range that the secondary session
uses.
Secondary Port
Number End
This shows the end of the trigger port range that the secondary session
uses.
Allow Multiple
Hosts
This shows if a secondary session is to be initiated to/from different
remote hosts.
Max Activity
Interval
This shows the maximum interval time (in milliseconds) between the
uses of the secondary port sessions.
Enable Session
Chaining
This shows whether multi-level TCP session chaining is allowed.
Enable UDP
Session
Chaining
This shows whether multi-level UDP and TCP session chaining is
allowed.
Binary Address
Replacement
This shows whether binary address replacement is to be used on an
existing trigger.
Address
Translation
Type
This shows what type of address replacement is set on a trigger.