DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Security and Firewall Protection
4-29
v1.0, April 2007
was made. When the application ceases to transmit data over the port, the router waits for a
timeout interval and then closes the port or range of ports, making them available to other
computers on the private network.
Once configured, the operation is as follows:
•
A PC makes an outgoing connection using a port number defined in the Outgoing Port
Triggering table.
•
The ProSafe DGFV338 records this connection, opens the incoming port or ports associated
with this entry in the Incoming Port Triggering table, and associates them with the PC.
•
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
•
This Router matches the response to the previous request, and forwards the response to the PC.
•
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
•
Only one PC can use a Port Triggering application at any time.
•
After a PC has finished using a Port Triggering application, there is a Time-out period before
the application can be used by another PC. This is required because this Router cannot be sure
when the application has terminated.
To add a new port triggering rule:
1.
Select
Security
from the main menu and
Port Triggering
from the submenu. The Port
Triggering screen will display.
2.
Enter the following data in the
Add Port Triggering Rule
fields:
a.
Name – Enter a suitable name for this rule (for example, the name of the application)
b.
Enable/Disable – Select the desired option from the pull-down menu.
c.
Outgoing (Trigger) Port Range – Enter the range of port numbers used by the application
on the private network when it generates an outgoing request.
d.
Incoming (Response) Port Range – Enter the range of port numbers used by the remote
system when it responds to the PC’s request.
Note:
For additional ways of allowing inbound traffic, see
“Inbound Rules (Port
Forwarding)” on page 4-7
.