Configuring Firewall
43
5.
Enter the application profile name in the
Application Profile Name
field.
6.
Create a definition for your application that is to be allowed through the firewall.
−
In the
Protocol
field, select the
TCP
or
UDP
radio button. If the application you are adding requires
both, you need to create a separate definition for each.
−
In the
Port (or Range)
field, enter the port or port range the application uses. For example, some
applications requires only one port to be opened (such as TCP port 500); others require that all
TCP ports from 600 to 1000 be opened.
−
In the
Protocol Timeout (seconds)
field, optionally enter a value for the amount of time that can pass
before the application “times out.” When leaving the field blank, the system uses the default
values (86400 seconds for the TCP protocol; 600 seconds for the UDP protocol).
−
In the
Map to Host Port
field, enter a value that maps the port range you established in the Port field
to the local computer. For example, if you set the value to 4000 and the port range being opened is
100 to 108, the forwarded data to the first value in the range will be sent to 4000. Subsequent
ports will be mapped accordingly; 101 will be sent to 4001, 102 will be sent to 4002, and so forth.
−
From the
Application Type
drop-down list, select the application type. If you do not know the
application type, select nothing.
Notes:
For easy identification, use the name of the application (for example,
Redwing Game Server).
Clicking
Back
returns to the
Allow device application traffic to pass through
firewall
page.
Note:
If only one port is required, enter the port number in the
From
field.
Note:
You can find the above information in the documentation provided by
the company that produces the application.