ZyXEL P-794H User Guide - Page 190
Security Trigger Configuration, Table 87
View all ZyXEL P-794H manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 190 highlights
Chapter 15 Security 15.2.4.2 Security Trigger Configuration Click Security Trigger Configuration to show the following screen. You can view your security trigger settings. Figure 119 Security Trigger Configuration The following table describes the labels in this screen. Table 87 Security Trigger Configuration LABEL DESCRIPTION Transport Type This shows the transport type of the trigger. Port Number Start This shows the start of the trigger port range that the primary session uses. Port Number End This shows the end of the trigger port range that the primary session uses. Secondary Port This shows the start of the trigger port range that the secondary session Number Start uses. Secondary Port This shows the end of the trigger port range that the secondary session Number End uses. Allow Multiple Hosts This shows if a secondary session is to be initiated to/from different remote hosts. Max Activity Interval This shows the maximum interval time (in milliseconds) between the uses of the secondary port sessions. Enable Session This shows whether multi-level TCP session chaining is allowed. Chaining Enable UDP Session Chaining This shows whether multi-level UDP and TCP session chaining is allowed. Binary Address This shows whether binary address replacement is to be used on an Replacement existing trigger. Address Translation Type This shows what type of address replacement is set on a trigger. 190 P-794H User's Guide