ZyXEL P-794H User Guide - Page 191

Add a New Trigger, Security Trigger Configuration, Table 88

Page 191 highlights

Chapter 15 Security Table 87 Security Trigger Configuration (continued) LABEL DESCRIPTION Delete Click this to remove the trigger. New Trigger Click this to create a new trigger. Add a New Trigger Click New Trigger in the Security Trigger Configuration screen. Figure 120 New Trigger The following table describes the labels in this screen. Table 88 Security Trigger Configuration LABEL DESCRIPTION Transport Type Select a transport type of the trigger, depending on whether a trigger for a TCP or a UDP application is to be added. Port Number Start Enter the start of the trigger port range that the primary session uses. Port Number End Enter the end of the trigger port range that the primary session uses. Secondary Port Enter the start of the trigger port range that the secondary session Number Start uses. Secondary Port Enter the end of the trigger port range that the secondary session uses. Number End Allow Multiple Hosts Select Allow to permit a secondary session is to be initiated to/from different remote hosts. If not, select Block. Max Activity Interval Enter the maximum interval time (in milliseconds) between the uses of the secondary port sessions. Enable Session Select Allow to permit multi-level TCP session chaining. If not, select Chaining Block. Enable UDP Session Chaining Select Allow to permit multi-level UDP and TCP session chaining is allowed. If not, select Block. You must allow Enable Session Chaining to enable this function. Binary Address Select Allow to permit binary address replacement to be used on an Replacement existing trigger. If not, select Block. P-794H User's Guide 191

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294

Chapter 15 Security
P-794H User’s Guide
191
Add a New Trigger
Click
New Trigger
in the
Security Trigger Configuration
screen.
Figure 120
New Trigger
The following table describes the labels in this screen.
Delete
Click this to remove the trigger.
New Trigger
Click this to create a new trigger.
Table 88
Security Trigger Configuration
LABEL
DESCRIPTION
Transport Type
Select a transport type of the trigger, depending on whether a trigger
for a
TCP
or a
UDP
application is to be added.
Port Number
Start
Enter the start of the trigger port range that the primary session uses.
Port Number
End
Enter the end of the trigger port range that the primary session uses.
Secondary Port
Number Start
Enter the start of the trigger port range that the secondary session
uses.
Secondary Port
Number End
Enter the end of the trigger port range that the secondary session uses.
Allow Multiple
Hosts
Select
Allow
to permit a secondary session is to be initiated to/from
different remote hosts. If not, select
Block
.
Max Activity
Interval
Enter the maximum interval time (in milliseconds) between the uses of
the secondary port sessions.
Enable Session
Chaining
Select
Allow
to permit multi-level TCP session chaining. If not, select
Block
.
Enable UDP
Session
Chaining
Select
Allow
to permit multi-level UDP and TCP session chaining is
allowed. If not, select
Block
.
You must allow
Enable Session Chaining
to enable this function.
Binary Address
Replacement
Select
Allow
to permit binary address replacement to be used on an
existing trigger. If not, select
Block
.
Table 87
Security Trigger Configuration (continued)
LABEL
DESCRIPTION