ZyXEL P-794H User Guide - Page 191
Add a New Trigger, Security Trigger Configuration, Table 88
![]() |
View all ZyXEL P-794H manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 191 highlights
Chapter 15 Security Table 87 Security Trigger Configuration (continued) LABEL DESCRIPTION Delete Click this to remove the trigger. New Trigger Click this to create a new trigger. Add a New Trigger Click New Trigger in the Security Trigger Configuration screen. Figure 120 New Trigger The following table describes the labels in this screen. Table 88 Security Trigger Configuration LABEL DESCRIPTION Transport Type Select a transport type of the trigger, depending on whether a trigger for a TCP or a UDP application is to be added. Port Number Start Enter the start of the trigger port range that the primary session uses. Port Number End Enter the end of the trigger port range that the primary session uses. Secondary Port Enter the start of the trigger port range that the secondary session Number Start uses. Secondary Port Enter the end of the trigger port range that the secondary session uses. Number End Allow Multiple Hosts Select Allow to permit a secondary session is to be initiated to/from different remote hosts. If not, select Block. Max Activity Interval Enter the maximum interval time (in milliseconds) between the uses of the secondary port sessions. Enable Session Select Allow to permit multi-level TCP session chaining. If not, select Chaining Block. Enable UDP Session Chaining Select Allow to permit multi-level UDP and TCP session chaining is allowed. If not, select Block. You must allow Enable Session Chaining to enable this function. Binary Address Select Allow to permit binary address replacement to be used on an Replacement existing trigger. If not, select Block. P-794H User's Guide 191
![](/manual_guide/products/zyxel-p794h-user-guide-bbafe41/191.png)