Firewall Protection
186
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Note these restrictions on port triggering:
•
Only one computer can use a port-triggering application at any time.
•
After a computer has finished using a port-triggering application, there is a short time-out
period before the application can be used by another computer. This time-out period is
required so the wireless VPN firewall can determine that the application has terminated.
Note:
For additional ways of allowing inbound traffic, see
Inbound Rules
(Port Forwarding)
on page 130.
To add a port-triggering rule:
1.
Select
Security > Port Triggering
. The Port Triggering screen displays. (The following
figure shows a rule in the Port Triggering Rule table as an example.)
Figure 101.
2.
In the Add Port Triggering Rule section, enter the settings as explained in the following table:
Table 40.
Port Triggering screen settings
Setting
Description
Name
A descriptive name of the rule for identification and management purposes.
Enable
From the drop-down list, select
Yes
to enable the rule. (You can define a rule but not
enable it.) The default setting is No.
Protocol
From the drop-down list, select the protocol to which the rule applies:
•
TCP
. The rule applies to an application that uses the Transmission Control
Protocol (TCP).
•
UDP
. The rule applies to an application that uses the User Datagram Protocol
(UDP).