Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports

Table 6-6.

Port Triggering

 

 

 

Item

 

Description

 

 

 

Port Triggering

 

• Enable - Indicates if the rule is enabled or disabled. Generally, there is no need to

Rules

 

disable a rule unless it interferes with some other function such as Port Forwarding.

 

 

• Name - The name for this rule.

 

 

• Outgoing Ports - The port or port range for outgoing traffic. An outgoing connection

 

 

using one of these ports will trigger this rule.

 

 

• Incoming Ports - The port or port range used by the remote system when it

 

 

responds to the outgoing request. A response using one of these ports will be

 

 

forwarded to the PC which triggered this rule.

 

 

Adding a new Rule

• To add a new rule, click the Add and enter the following data on the resulting

 

 

screen.

 

 

• Name - enter a suitable name for this rule (e.g., the name of the application)

 

 

• Enable/Disable - select the desired option.

 

 

• Outgoing (Trigger) Port Range - enter the range of port numbers used by the

 

 

application when it generates an outgoing request.

 

 

• Incoming (Response) Port Range - enter the range of port numbers used by the

 

 

remote system when it responds to the PC's request.

 

 

Modifying or Deleting

• Select the desired rule by clicking the radio button beside the rule.

an existing Rule:

 

• Click Edit or Delete as desired.

 

 

Checking Operation

To see which rules are currently being used, click the Status button. The following

and Status

 

data will be displayed:

 

 

• Rule - the name of the Rule.

 

 

• LAN IP Address - The IP address of the PC currently using this rule.

 

 

• Open Ports - the Incoming ports which are associated the this rule. Incoming traffic

 

 

using one of these ports will be sent to the IP address above.

 

 

• Time Remaining - The time remaining before this rule is released, and thus

 

 

available for other PCs. This timer is restarted whenever incoming or outgoing

 

 

traffic is received.

 

 

 

Getting E-Mail Notifications of Event Logs and Alerts

Your router will log security-related events such as denied incoming service requests, hacker probes, and administrator logins, according to your settings on this screen.

If you have set up content filtering on the Block Sites page (see “Block Sites” on page 6-24), you can also log when someone on your network tried to access a blocked site.

In order to receive logs and alerts by e-mail, you must provide your e-mail information in the E-Mail Logs subheading:

6-30

Firewall Protection and Content Filtering

202-10085-01, March 2005

Page 106
Image 106
NETGEAR FVS124G manual Getting E-Mail Notifications of Event Logs and Alerts, Port Triggering