User Manual 
Aolynk DR811/DR814 ADSL2+Broadband Router 
4  Web-based Management
33 
●
Transport Type
: select a transport type from the drop-down list, depending on 
whether you are adding a trigger for a TCP or a UDP application. 
●
Port Number Start
: type the start of the trigger port range that the primary session 
uses. 
●
Port Number End
: type the end of the trigger port range that the primary session 
uses. 
●
Secondary Port Number Start
: type the start of the trigger port range that the 
secondary session uses. 
●
Secondary Port Number End
: type the end of the trigger port range that the 
secondary session uses. 
●
Allow Multiple Hosts
: select 
Allow
if you want a secondary session to be 
initiated to/from different remote hosts. Select 
Block 
if you want a secondary 
session to be initiated only to/from the same remote host. 
●
Max Activity Interval
: type the maximum interval time (in milliseconds) between 
the use of secondary port sessions. 
●
Enable Session Chaining
: select 
Allow
or 
Block
depending on whether you 
want to allow multi-level TCP session chaining. 
●
Enable UDP Session Chaining
: select 
Allow 
or 
Block
depending on whether 
you want to allow multi-level UDP and TCP session chaining. 
Enable Session 
Chaining
must be set to 
Allow
for this option to work. 
●
Binary Address Replacement
: select 
Allow
or 
Block
depending on whether you 
want to use binary address replacement on an existing trigger. 
●
Address Translation Type
: specify what type of address replacement is set on a 
trigger. 
Binary Address Replacement
must be set to 
Allow
for this option to 
work. 
Once you have configured the trigger, click the 
button. The 
Security Trigger 
Configuration
page is displayed, containing details of the trigger that you have just 
configured. 
To delete an existing security trigger, click the corresponding
label to open the 
web page 
Delete Triggers
. 
 19216811.live
19216811.live