Page 56 / 106 Scroll up to view Page 51 - 55
56
HITRON BVW-3653 USER’S GUIDE
FIREWALL
4.6
THE PORT TRIGGERING SCREEN
Use this screen to configure port triggering. You can turn port triggering on or off and
configure new and existing port triggering rules.
Click
Firewall
>
Port Triggering
. The following screen displays.
Protocol
Use this field to specify whether the BVW-3653 should
forward traffic via:
±
Transmission Control Protocol (
TCP
)
±
User Datagram Protocol (
UDP
)
±
Transmission Control Protocol and User Datagram
Protocol (
TCP/UDP
)
±
Generic Routing Encapsulation (
GRE
)
±
Encapsulating Security Protocol (
ESP
)
NOTE:
If in doubt, leave this field at its default (
TCP/
UDP
).
IP Address
Use this field to enter the IP address of the computer on
the LAN to which you want to forward the traffic.
Connected Computers
Click this to see a list of the computers currently
connected to the BVW-3653 on the LAN.
Back
Click this to return to the
Firewall
>
Forwarding
screen
without saving your changes to the port forwarding rule.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 20:
The Firewall > Forwarding > Add/Edit Screen
Page 57 / 106
57
HITRON BVW-3653 USER’S GUIDE
FIREWALL
FIGURE 21:
The Firewall > Port Triggering Screen
The following table describes the labels in this screen.
TABLE 21:
The Firewall > Port Triggering Screen
All Port Triggering Rules
Use this field to turn port triggering on or off.
±
Select the checkbox to enable port triggering.
±
Deselect the checkbox to disable port triggering.
Select
Select a port triggering rule’s radio button (
) before
clicking
Edit
or
Delete
.
#
This displays the arbitrary identification number
assigned to the port triggering rule.
Application Name
This displays the arbitrary name you assigned to the
rule when you created it.
Port Range
These fields display the ports to which the rule applies:
±
The
Trigger
field displays the range of outgoing
ports. When the BVW-3653 detects activity
(outgoing traffic) on these ports from computers on
the LAN, it automatically opens the
Target
ports.
±
The
Target
field displays the range of triggered
ports. These ports are opened automatically when
the BVW-3653 detects activity on the
Trigger
ports
from computers on the LAN.
Protocol
This displays the protocol of the port triggering rule.
Timeout (ms)
This displays the time (in milliseconds) after the BVW-
3653 opens the
Target
ports that it should close them.
Enable
Use this field to turn each port triggering rule on or off.
±
Select this checkbox to enable the port triggering
rule.
±
Deselect this checkbox to disable the port triggering
rule.
Page 58 / 106
58
HITRON BVW-3653 USER’S GUIDE
FIREWALL
4.6.1
ADDING OR EDITING A PORT TRIGGERING RULE
±
To add a new port triggering rule, click
Add
in the
Firewall
>
Port Triggering
screen.
±
To edit an existing port triggering rule, select the rule’s radio button (
) in the
Firewall
>
Port Triggering
screen and click the
Edit
button.
The following screen displays.
FIGURE 22:
The Firewall > Port Triggering > Add/Edit Screen
Add New
Click this to define a new port triggering rule. See
Adding or Editing a Port Triggering Rule
on page
58
for
information on the screen that displays.
Edit
Select a port triggering rule’s radio button (
) and click
this to make changes to the rule. See
Adding or Editing
a Port Triggering Rule
on page
58
for information on the
screen that displays.
Delete
Select a port triggering rule’s radio button (
) and click
this to remove the rule. The deleted rule’s information
cannot be retrieved.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 21:
The Firewall > Port Triggering Screen
Page 59 / 106
59
HITRON BVW-3653 USER’S GUIDE
FIREWALL
The following table describes the labels in this screen.
TABLE 22:
The Firewall > Port Triggering > Add/Edit Screen
Application Name
Enter a name for the application for which you want to
create the rule.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
Trigger Port Range
Use these fields to specify the trigger ports. When the
BVW-3653 detects activity on any of these ports
originating from a computer on the LAN, it automatically
opens the
Target
ports in expectation of incoming traffic.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Target Port Range
Use these fields to specify the target ports. The BVW-
3653 opens these ports in expectation of incoming traffic
whenever it detects activity on any of the
Trigger
ports.
The incoming traffic is forwarded to these ports on the
computer connected to the LAN.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol
Use this field to specify whether the BVW-3653 should
activate this trigger when it detects activity via:
±
Transmission Control Protocol (
TCP
)
±
User Datagram Protocol (
UDP
)
±
Transmission Control Protocol and User Datagram
Protocol (
Both
)
NOTE:
If in doubt, leave this field at its default (
Both
).
Timeout (ms)
Enter the time (in milliseconds) after the BVW-3653
opens the
Target
ports that it should close them.
Connected Computers
Click this to see a list of the computers currently
connected to the BVW-3653 on the LAN.
Back
Click this to return to the
Firewall
>
Forwarding
screen
without saving your changes to the port forwarding rule.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 60 / 106
60
HITRON BVW-3653 USER’S GUIDE
FIREWALL
4.7
THE DMZ SETTING SCREEN
Use this screen to configure your network’s Demilitarized Zone (DMZ).
NOTE:
Only one device can be on the DMZ at a time.
Click
Firewall
>
DMZ Setting
. The following screen displays.
FIGURE 23:
The Firewall > DMZ Setting Screen
The following table describes the labels in this screen.
4.8
THE LOCAL LOGS SCREEN
Use this screen to see information about firewall activity.
Click
Firewall
>
Local Logs
. The following screen displays.
TABLE 23:
The Firewall > DMZ Setting Screen
Enable DMZ Host
Use this field to turn the DMZ on or off.
±
Select the checkbox to enable the DMZ.
±
Deselect the checkbox to disable the DMZ.
Computers that were previously in the DMZ are now
on the LAN.
Connected Computers
Click this to see a list of the computers currently
connected to the BVW-3653 on the LAN.
IP Address
Enter the IP address of the computer that you want to
add to the DMZ.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top