Configure Port Triggering - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Table 35. IP/MAC Binding screen settings (continued)
Setting
IP Address
Log Dropped
Packets
3.
Click the Add table button. The new IP/MAC rule is added to the IP/MAC Bindings table.
4.
Click Apply to save your changes.
To edit an IP/MAC binding:
1.
In the IP/MAC Bindings table, click the Edit table button to the right of the IP/MAC
binding that you want to edit. The Edit IP/MAC Binding screen displays.
2.
Modify the settings that you wish to change (see the previous table).
3.
Click Apply to save your changes. The modified IP/MAC binding displays in the IP/MAC
Bindings table.
To remove one or more IP/MAC bindings from the table:
1.
Select the check box to the left of each IP/MAC binding that you want to delete, or click
the Select All table button to select all bindings.
2.
Click the Delete table button.

Configure Port Triggering

Port triggering allows some applications running on a LAN network to be available to external
applications that would otherwise be partially blocked by the firewall. Using the port-triggering
feature requires that you know the port numbers used by the application.
Once configured, port triggering operates as follows:
1.
A PC makes an outgoing connection using a port number that is defined in the Port
Triggering Rules table.
2.
The UTM records this connection, opens the additional incoming port or ports that are
associated with the rule in the port triggering table, and associates them with the PC.
3.
The remote system receives the PC's request and responds using the incoming port or ports
that are associated with the rule in the port triggering table on the UTM.
4.
The UTM matches the response to the previous request and forwards the response to the
PC.
Without port triggering, the response from the external application would be treated as a new
connection request rather than a response to a request from the LAN network. As such, it
would be handled in accordance with the inbound port-forwarding rules, and most likely
would be blocked.
ProSecure Unified Threat Management (UTM) Appliance
Description
The IP address of the PC or device that is bound to the MAC address.
To log the dropped packets, select Enable from the drop-down list. The default setting
is Disable.
Firewall Protection
168

Advertisement

Table of Contents
loading

Table of Contents