Page 101 / 212 Scroll up to view Page 96 - 100
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Security and Firewall Protection
4-29
v1.0, April 2007
was made. When the application ceases to transmit data over the port, the router waits for a
timeout interval and then closes the port or range of ports, making them available to other
computers on the private network.
Once configured, the operation is as follows:
A PC makes an outgoing connection using a port number defined in the Outgoing Port
Triggering table.
The ProSafe DGFV338 records this connection, opens the incoming port or ports associated
with this entry in the Incoming Port Triggering table, and associates them with the PC.
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
This Router matches the response to the previous request, and forwards the response to the PC.
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
Only one PC can use a Port Triggering application at any time.
After a PC has finished using a Port Triggering application, there is a Time-out period before
the application can be used by another PC. This is required because this Router cannot be sure
when the application has terminated.
To add a new port triggering rule:
1.
Select
Security
from the main menu and
Port Triggering
from the submenu. The Port
Triggering screen will display.
2.
Enter the following data in the
Add Port Triggering Rule
fields:
a.
Name – Enter a suitable name for this rule (for example, the name of the application)
b.
Enable/Disable – Select the desired option from the pull-down menu.
c.
Outgoing (Trigger) Port Range – Enter the range of port numbers used by the application
on the private network when it generates an outgoing request.
d.
Incoming (Response) Port Range – Enter the range of port numbers used by the remote
system when it responds to the PC’s request.
Note:
For additional ways of allowing inbound traffic, see
“Inbound Rules (Port
Forwarding)” on page 4-7
.
Page 102 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
4-30
Security and Firewall Protection
v1.0, April 2007
3.
Figure 4-19
Table 4.2
Port triggering
Item
Description
Port Triggering
Rules
Enable - Indicates if the rule is enabled or disabled. Generally, there is no
need to disable a rule unless it interferes with some other function such as
Port Forwarding.
Name - The name for this rule.
Outgoing Ports - The port or port range for outgoing traffic. An outgoing
connection using one of these ports will trigger this rule.
Incoming Ports - The port or port range used by the remote system when it
responds to the outgoing request. A response using one of these ports will be
forwarded to the PC which triggered this rule.
Adding a new Rule
To add a new rule, click the Add and enter the following data on the resulting
screen.
Name - enter a suitable name for this rule (e.g., the name of the application)
Enable/Disable - select the desired option.
Outgoing (Trigger) Port Range - enter the range of port numbers used by the
application when it generates an outgoing request.
Incoming (Response) Port Range - enter the range of port numbers used by
the remote system when it responds to the PC's request.
Page 103 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Security and Firewall Protection
4-31
v1.0, April 2007
Setting a Schedule to Block or Allow Specific Traffic
If you enabled Content Filtering in the Security/Block Sites menu, or if you defined an outbound
rule to use a schedule, you can set up a schedule for when blocking occurs or when access is
restricted. The firewall allows you to specify when blocking will be enforced by configuring the
Schedule 1, Schedule 2 or Schedule 3 screens.
The ProSafe DGFV338 uses the Network Time Protocol (NTP) to obtain the current time and date
from one of several Network Time Servers on the Internet.
To invoke rules and block keywords or Internet domains based on a schedule:
1.
Select
Security
from the main menu, and
Schedule
from the submenu. The Schedule 1 screen
will display.
2.
Schedule which Days you want by selecting either the
All Days
radio button or the
Specific
Days
radio button. If you selected
Specific Days,
specify which days.
3.
Select the time of day radio box: either
All Day
if you want to limit access completely for the
selected days; or select a
Specific Times
to limit access during the selected days.
If you selected
Specific Times,
enter the
Start Time
and
End Time
for this schedule in the
appropriate fields.
4.
Click
Apply
to save your settings.
Modifying or Deleting
an existing Rule:
Select the desired rule by clicking the radio button beside the rule.
Click Edit or Delete as desired.
Checking Operation
and Status
To see which rules are currently being used, click the Status button. The
following data will be displayed:
Rule - the name of the Rule.
LAN IP Address - The IP address of the PC currently using this rule.
Open Ports - the Incoming ports which are associated the this rule. Incoming
traffic using one of these ports will be sent to the IP address above.
Time Remaining - The time remaining before this rule is released, and thus
available for other PCs. This timer is restarted whenever incoming or outgoing
traffic is received.
Note:
Enter the values as 24-hour time. For example, 10:30 am would be 10 hours and 30
minutes and 10:30 pm would be 22 hours and 30 minutes.
Table 4.2
Port triggering
Item
Description
Page 104 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
4-32
Security and Firewall Protection
v1.0, April 2007
Event Logs and Alerts
Your router will log security-related events such as denied incoming service requests, hacker
probes, and administrator logins, according to your settings on this screen in the Routing Logs
section.
For example, if the Default Outbound Policy is “Block Always”, and Accept Packets from LAN to
WAN is enabled then, if there is a firewall rule to allow ssh traffic from the LAN, whenever a LAN
machine tries to make an ssh connection, those packets will be accepted and a message will be
logged.
In order to receive logs and alerts by e-mail, you must provide your e-mail information in the E-
Mail Logs section.
Figure 4-20
Note:
Make sure the log option for the firewall rule is set to log “always” (see the
Security menu, Firewall Rules submenu).
Note:
Enabling logging options may generate a significant volume of log messages and is
recommended for debugging purposes only.
Page 105 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Security and Firewall Protection
4-33
v1.0, April 2007
To view the Logs and E-mail screen:
1.
Select
Monitoring
from the main menu and
Firewall Logs and E-mail
from the submenu.
The
Firewall Logs and E-mail
screen will display.
The
Log Options
section will display the
Log Identifier
field. A mandatory field to identify
the log messages. This ID is appended to log messages.
2.
From the
Routing Logs
section, check the radio boxes of the Accepted Packets and/or
Dropped packets you want to log.
Figure 4-21

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top