ZyXEL Communications P-794H User Manual page 190

8 wire g.shdsl cpe with 4 port lan
Hide thumbs Also See for P-794H:
Table of Contents

Advertisement

Chapter 15 Security
15.2.4.2 Security Trigger Configuration
Click Security Trigger Configuration to show the following screen. You can view
your security trigger settings.
Figure 119 Security Trigger Configuration
The following table describes the labels in this screen.
Table 87 Security Trigger Configuration
LABEL
Transport Type
Port Number
Start
Port Number
End
Secondary Port
Number Start
Secondary Port
Number End
Allow Multiple
Hosts
Max Activity
Interval
Enable Session
Chaining
Enable UDP
Session
Chaining
Binary Address
Replacement
Address
Translation
Type
190
DESCRIPTION
This shows the transport type of the trigger.
This shows the start of the trigger port range that the primary session
uses.
This shows the end of the trigger port range that the primary session
uses.
This shows the start of the trigger port range that the secondary session
uses.
This shows the end of the trigger port range that the secondary session
uses.
This shows if a secondary session is to be initiated to/from different
remote hosts.
This shows the maximum interval time (in milliseconds) between the
uses of the secondary port sessions.
This shows whether multi-level TCP session chaining is allowed.
This shows whether multi-level UDP and TCP session chaining is
allowed.
This shows whether binary address replacement is to be used on an
existing trigger.
This shows what type of address replacement is set on a trigger.
P-794H User's Guide

Advertisement

Table of Contents
loading

Table of Contents