Policies, Triggers, Intrusion Detection, Logging - ZyXEL Communications P-794H User Manual

8 wire g.shdsl cpe with 4 port lan
Hide thumbs Also See for P-794H:
Table of Contents

Advertisement

Chapter 15 Security
The following table describes the labels in this screen.
Table 83 NAT Reserved Mapping
LABEL
IP Addresses
Transport
External Port
Range
Internal Port
Range
Add Reserved
Mapping

15.2.4 Policies, Triggers, Intrusion Detection, Logging

You can configure firewall policies in the Policies, Triggers, Intrusion
Detection, Logging section. Click on the policy you want to configure.
Figure 114 Policies, Triggers, Intrusion Detection, Logging
186
DESCRIPTION
Global: if mapping from a global IP address, enter the address here.
If mapping from a security interface, enter 0.0.0.0.
Internal: Enter the IP address of an individual host inside the
network.
Specify the transport type that is to be mapped from the outside
interface to the inside.
Enter start and end of the external port number range that the
transport uses.
Enter start and end of the internal port number range that the transport
uses.
Click this to refreshed and the reserved mapping is added to the NAT
configuration.
P-794H User's Guide

Advertisement

Table of Contents
loading

Table of Contents