Paradyne 1752 SHDSL User Manual page 61

Shdsl routers
Hide thumbs Also See for 1752 SHDSL:
Table of Contents

Advertisement

a. Transport Type. Select a transport type from the drop-down list, depending on whether you
are adding a trigger for a TCP or a UDP application.
b. Port Number Start. Type the start of the trigger port range that the primary session uses.
c. Port Number End. Type the end of the trigger port range that the primary session uses.
d. Allow Multiple Hosts. Select allow if you want a secondary session to be initiated to or from
different remote hosts. Select block if you want a secondary session to be initiated only to or
from the same remote host.
e. Max Activity Interval. Type the maximum interval time (in milliseconds) between the use of
secondary port sessions.
f. Enable Session Chaining. Select Allow or Block depending on whether you want to allow
multi-level TCP session chaining.
g. Enable UDP Session Chaining. Select Allow or Block depending on whether you want to
allow multi-level UDP and TCP session chaining. Set Enable Session Chaining to Allow to
enable it.
h. Binary Address Replacement. Select Allow or Block depending on whether you want to
use binary address replacement on an existing trigger.
i. Address Translation Type. Specify what type of address replacement is set on a trigger. Set
Binary Address Replacement to Allow to enable it.
3. Once you have configured the trigger, click on
page is displayed, containing details of the trigger that you have just configured.
4. Each trigger displayed in the Firewall Trigger Configuration page has a Delete hyperlink
assigned to it. To delete a trigger, click on this link, then at the confirmation page, click on the
Delete button. The Firewall Trigger Configuration page is displayed with details of the deleted
trigger removed. There are two hyperlinks on the page:
a. To add a new trigger, click on New Trigger.
b. To display the Security Interface Configuration page, click on Return to Interface List.
Configuring Intrusion Detection Settings
Intrusion Detection settings allow you to protect your network from intrusions such as denial
of service (DOS) attacks, port scanning, and web spoofing. This section assumes that you
have followed the instructions in the
and/or Intrusion Detection
To configure Intrusion Detection settings:
1. Go to the Policies, Triggers and Intrusion Detection section of the Security Interface
Configuration page. Click on Configure Intrusion Detection. The Firewall Configure Intrusion
Detection page is displayed:
1752-A2-GB20-00
Enabling Security
section.
June 2005
1752 and 1754 SHDSL Router User's Guide
. The Firewall Trigger Configuration
section and the
Enabling Firewall
61

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

1754 shdsl17521754

Table of Contents