User Manual
Aolynk DR811/DR814 ADSL2+Broadband Router
4 Web-based Management
33
●
Transport Type
: select a transport type from the drop-down list, depending on
whether you are adding a trigger for a TCP or a UDP application.
●
Port Number Start
: type the start of the trigger port range that the primary session
uses.
●
Port Number End
: type the end of the trigger port range that the primary session
uses.
●
Secondary Port Number Start
: type the start of the trigger port range that the
secondary session uses.
●
Secondary Port Number End
: type the end of the trigger port range that the
secondary session uses.
●
Allow Multiple Hosts
: select
Allow
if you want a secondary session to be
initiated to/from different remote hosts. Select
Block
if you want a secondary
session to be initiated only to/from the same remote host.
●
Max Activity Interval
: type the maximum interval time (in milliseconds) between
the use of secondary port sessions.
●
Enable Session Chaining
: select
Allow
or
Block
depending on whether you
want to allow multi-level TCP session chaining.
●
Enable UDP Session Chaining
: select
Allow
or
Block
depending on whether
you want to allow multi-level UDP and TCP session chaining.
Enable Session
Chaining
must be set to
Allow
for this option to work.
●
Binary Address Replacement
: select
Allow
or
Block
depending on whether you
want to use binary address replacement on an existing trigger.
●
Address Translation Type
: specify what type of address replacement is set on a
trigger.
Binary Address Replacement
must be set to
Allow
for this option to
work.
Once you have configured the trigger, click the
button. The
Security Trigger
Configuration
page is displayed, containing details of the trigger that you have just
configured.
To delete an existing security trigger, click the corresponding
label to open the
web page
Delete Triggers
.